后台小程序开发的全方位指南
698
2022-10-25
WMD 用于IT安全工具的python框架
WMD
Weapon of Mass Destruction
This is a python tool with a collection of IT security software. The software is incapsulated in "modules". The modules does consist of pure python code and/or external third programs.
Main functions
To use a module, run the command "use [module_call]", e.g. "use apsniff", to activate the module.The modules options can be changed with "set [parameter] [value]".Inside the modules, you always have the possibilty to view the options with the command "so". 4)Your environment settings is in core/config.ini. Please adjust them before running.
Web menu
Run the command "www" from the console to activate a Flask server showing the modules in your browser. Access it from: 127.0.0.1:5000.
Modules are loaded directly into a xterm. DEV: Try the SniffHTTP and APsniff module - define parameters in the browser.
Modules
CAT: | TYPE: | CALL: | NAME: | DESCRIPTION: |
---|---|---|---|---|
bruteforce | creds | changeme | Default creds scan | Scan IP's for services and try logging in with default credentials (Arthur: ztgrace) |
bruteforce | loginpath | adminfinder | Admin Finder | A Simple script to find admin-paths for webpages. (Arthur: Spaddex) |
bruteforce | rar | bfrar | BF RAR | Bruteforce a RAR file |
bruteforce | ssh | bfssh | Bruteforce SSH | Bruteforce SSH login |
bruteforce | web | bfweb | Bruteforce weblogin form | Bruteforce a weblogin form with word- and passlist |
bruteforce | zip | bfzip | BF ZIP | Bruteforce a ZIP file |
cracking | aut | john | John the Ripper | As you know - kill the hash |
cracking | hash | hashid | Identify hash | Identify a hash |
cracking | wpa | crackwpa | Crack WPA 4-way handshake | Gather WPA 4-way handshake from accesspoint and crack it |
exploit | browser | browserpwn | Browser Autopwn2 | This module will automatically serve browser exploits (Arthur: sinn3r[at]metasploit.com) |
exploit | search | exploitdb | Exploitdb | Shell-style script to search exploit-db.com exploits. (Arthur: mattoufoutu) |
sin | mspoofcheck | Spoofcheck email domain | Check if a domain can be spoofed for e.g. emailing | |
monitor | arp | arpmon | ARP monitor alert | Monitor ARP table and alert for changes |
monitor | ip | ipmon | IP monitor alert | Monitor IP's and alert for changes |
other | settings | settings | Change settings | Change your environment settings, e.g. interface |
pentesting | niptt | sparta | SPARTA | SPARTA is a python GUI application which simplifies network infrastructure penetration testing. |
phishing | ap | etphis | Ewil Twin phishing | Create a Evil Twin and redirect user to fake password page. |
phishing | webpage | webphis | Webpage phishing | Run a local flask server with phishing pages. |
recon | dns | dig | Domain info groper | Using dig command you can query DNS name servers for your DNS lookup related tasks |
recon | dns | dnsmap | dnsmap | DNS Network Mapper. Enumeration and bruteforcing. |
recon | dns | dnsrecon | dnsrecon | Multiple DNS recon abilities. |
router | framework | rsploit | Routersploit | Framework for routers with exploits and getting creds. (Arthur: Reverse Shell Security) |
scan | sin | lanscan | Lan scan | Scan local net - recon |
sniff | aut | apsniff | AP sniff | Create AP and sniff HTTPS and avoid HSTS + Beef |
sniff | http | sniffhttp | Sniff HTTP | Sniff HTTP packages. Extract username and passwords from traffic. |
sniff | sin | bettercap | Bettercap | Bettercap integration for sniffing packets and bypass HSTS and HTTPS |
socialeng | instabot | Instagram bot | Instagram bot for performing various activities (Arthur: LevPasha) | |
spoof | arp | arpspoof | ARP spoof | Spoofing ARP |
sql | sqli | gdsqli | Gdork SQLi | Scrape net for urls and check if they are prone to SQL injection |
sql | sqli | sqlmap | SQLmap | Just an activation of SQLmap. |
system | mac | macc | Macchanger | Change your MAC address |
tools | search | searchht | Search hacktools | Searchengine for hackingtools |
wifi | accesspoint | createap | Create an Accesspoint | Create an Accesspoint |
wifi | wifi | wifiutils | WiFi utils | Utilities for WiFi, e.g. deauth, WiFi's, clients, probes, etc. |
Run
Before your first run, please: 1. Adjust your environment settings in core/config.ini.default 2. Rename core/config.ini.default to core/config.ini
Start the console with: python3 wmd.py
Start a single module: python3 wmd.py -m [CALL]
Start webserver: python3 wmd.py -w
Start without checking requirements: python3 wmd.py -nc
Requirements
Before your first run, please: 1. Adjust your environment settings in core/config.ini.default 2. Rename core/config.ini.default to core/config.ini
Requirements:
Linux operating systemPython3Python libraries requirements in requirements.txt
Optional tools/software/GIT: modules which needs them will inform you about it and just dont run..
GIT: Admin-FinderAircrack-ngAiromon-ngAirodump-ngAirolib-ngArpArpspoofBeefBettercapGIT: changemeCrackMapExecCreate_apDigDnsmapGIT: DnsreconGIT: ExploitdbGIT: HashidHostapdGIT: InstabotJohn the RipperNmapGIT: RoutersploitSPARTAGIT: SpoofcheckGIT: XSSER
Development
Structure
core --> The core files with functions used all over the codefiles --> Static files, passwordlist, etc.logs --> Standard folder for saving logs intomodules --> Containing the modulestmp --> Guesstools --> GIT toolswww --> Files for the webserver
New module
Checkout the template in modules/module_template.py
Add module
Run python3 wmd.py -a modulePathName.py
Pull requests
Only python3 codeCode needs to follow pep8 flake8 (no need for linebreak)
Todo
First priority
More modulesInteractive webinterface. Set settings and get results in the browser <-- sniffhttp and apsniff doneRename config.ini to config.ini.default to avoid overriding userspecific config file
Various
ProxychainTorThreading on all BFTry/except on imports on modules for running with os.systemAdd run command with : in modulesAdd info about 'set para value' in modules (missing?!)Regenerate modules.xml (loop through modules)Design modules with core import and parser for designCheck that there are enough credit to arthurs of tools, repos, etc.Split updatetools into local tools vs gitWhen adding modules strip <> to ensuring XML formatChange behavior of install and update toolsAdd invoke option inside all modulesAll modules - change options to OptionsSplit files folder up into lists, etcCore network and wifi - merged?Original arthurs will be displayed below banner on modules. Todo.When showing modules indicate somehow what they requireSet modules parameters in browser dialogAdd args to all modules and create dialog HTML (automated tool in development)
core/tools.py
Do a run through config.ini and extract names for the updatecommand instead of DRY in two functions
Internal code
cleanup getLocalIP (local_ip) in functionsPEP8/Flake8 for old modules
Modules
SQLmapSpartahttp sniff pwd <-- DoneEvil Twin - deauth + info about unmanaging in NetworkManagerEvil Twin - arg parse for landingpage / + logfunctionmonitor network autoxssertarget attack website or ipsystem informationdns fakegrep, sed, awkscapy on all network activityAdmin finder - checkout google/bing search before BFChangeme - ZtgraceOsint frameBettercap modules. Implementation in other modules. Excellent performance.Create Access Point with hostapd and dnsmasq. Already implemented in Ewil Twin
版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。
发表评论
暂时没有评论,来抢沙发吧~