███████╗██╗ ██╗████████╗
██╔════╝██║ ██║╚══██╔══╝
█████╗ ███████║ ██║
██╔══╝ ██╔══██║ ██║
███████╗██║ ██║ ██║
╚══════╝╚═╝ ╚═╝ ╚═╝
(Hacker support from entynetproject corp)
entynetproject.simplesite.com
EntynetHackerTools for linux with gnome-terminal (PRO or lite!)
PRO version of ehtools framework:
Lite version of ehtools framework:
cd ehtools
chmod +x install.sh
./install.sh
ehtools
cd ehtoolslite
chmod +x install.sh
./install.sh
eht
PRO INSTALLATION:
INSTALL.SH:
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Most new Wi-Fi hacking tools rely on many of the same underlying attacks, and scripts that automate using other more familiar tools like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program.
An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this makes the process of using these tools easier to remember and can be seen as sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself.
An example of this we've covered is the Airgeddonframework, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters but has the disadvantage of preventing beginners from understanding what's happening "under the hood" of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network.
The Ehtools Framework starts by merely typing the letter ehtools or eht into a terminal window, then it asks for the name of your network interfaces after the first run. It uses the names you supply to connect to the tools needed to execute any attacks you select. Aside from that initial input, the majority of the possible attacks can be performed merely by choosing the option number from the menu. This means you can grab a network handshake or download a new hacking tool like Pupy by just selecting from one of the menu options.
To begin, we can access data about the network we're currently connected to, as well as any network interfaces, from the main menu. Here, we can find local information by just typing l to pull up local IP information, as seen below.
This allows us to do things like scan the network for other devices. This part of Ehtools Framework gives us better visibility on a network and situational awareness of what devices are around us. The various information can be broken down as follows:
if - Runs ifconfig and gives the names and information about all network devices.
1 - Enable wlan0 (d1 disables it).
2 - Enable wlan0mon (d2 disables it).
3 - Randomize or set the MAC address to a specific value.
7 - View the public IP address your computer is leaving on sites you visit.
19 - Look up the physical address of a given IP address to determine it's relative location.
scan - Start an ARP scan on the network to discover nearby devices.
start - Start monitor mode on the wireless network adapter.
stop - Stop wireless monitor mode on the network adapter.
Part of the fun of Ehtools is how easy it is to add new tools to our arsenal. To demonstrate this, let's download Pupy, a Python-based RAT designed to take control of other computers on the network. We can select option 9 to access the list of tools in Ehtools Framework.
From the next menu, the tools are broken down into major categories, with options for managing the installation of scripts. The options presented are:
1 - Wi-Fi tools (tools for attacking wireless networks).
2 - Remote access (tools for getting remote access to other devices and remotely managing them).
3 - Information gathering (collecting intelligence on people or website).
4 - Website tools (tools for exploiting or attacking sites).
5 - Other (a miscellaneous collection of other hacking tools)
You can also manage your installed tools by accessing option 6. To download Pupy, we'll go to option 2, which is remote access. Here, we will see a list of different tools for remote access, and we can select option 3 for Pupy. Here, we can see Pupy is not installed because it appears in red.
more than 58 hacker tools
fast hacking
easy in learning
more than 100 tools you can install from this CLI
Linux with /root/ (Kali linux)
Gnome-terminal shell (sudo apt-get install gnome-terminal)
./uninstall.sh