From a90625f6ee5e3e0fa942c4566efee71f39a796d6 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:27:06 +0000 Subject: [PATCH 01/15] Updated according to python3 The installer throws error because xerosploit have been old now I developed it to work with python3. Python2 has been old and in many distros don't have some python2 modules in their repositories so updated --- install.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/install.py b/install.py index 8e7dcfe..37074c4 100755 --- a/install.py +++ b/install.py @@ -1,4 +1,4 @@ -#!/usr/bin/python +#!/usr/bin/python3 # -*- coding: utf-8 -*- import os import sys @@ -42,7 +42,7 @@ def main(): 1) Ubuntu / Kali linux / Others 2) Parrot OS """) - system0 = raw_input(">>> ") + system0 = input(">>> ") if system0 == "1": print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m") install = os.system("apt-get update && apt-get install -y nmap hping3 build-essential python-pip ruby-dev git libpcap-dev libgmp3-dev && pip install tabulate terminaltables") @@ -54,7 +54,7 @@ def main(): bet_un = os.system("apt-get remove bettercap") # Remove bettercap to avoid some problems . Installed by default with apt-get . bet_re_ins = os.system("gem install bettercap") # Reinstall bettercap with gem. - install = os.system("apt-get update && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python-tabulate python-terminaltables") + install = os.system("apt-get update && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python3-tabulate python3-terminaltables") install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfuly instaled. Execute 'xerosploit' in your terminal." """) From d131aa6da0ddd1c58704c6017f4730f53904b7e5 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:31:23 +0000 Subject: [PATCH 02/15] Updated according python3 This tool has been old like python2 now it will work like python3 and it can comeback again. I have to do that because many new distros' repositories don't have python2 modules like python-terminaltables but after change it can work with python3 --- xerosploit.py | 62 +++++++++++++++++++++++++-------------------------- 1 file changed, 31 insertions(+), 31 deletions(-) diff --git a/xerosploit.py b/xerosploit.py index b1a02c7..38f4477 100755 --- a/xerosploit.py +++ b/xerosploit.py @@ -1,4 +1,4 @@ -#!/usr/bin/python +#!/usr/bin/python3 # -*- coding: utf-8 -*- #---------------------------------------------------------------------------# @@ -135,7 +135,7 @@ def target_ip(): target_parse = " --target " # Bettercap target parse . This variable will be wiped if the user want to perform MITM ATTACK on all the network. print ("\033[1;32m\n[+] Please choose a target (e.g. 192.168.1.10). Enter 'help' for more information.\n\033[1;m") - target_ips = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() + target_ips = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() if target_ips == "back": home() @@ -157,7 +157,7 @@ def program0(): def option(): """ Choose a module """ print("\033[1;32m\n[+] Which module do you want to load ? Enter 'help' for more information.\n\033[1;m") - options = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc... + options = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc... # Port scanner if options == "pscan": print(""" \033[1;36m @@ -177,7 +177,7 @@ def pscan(): print("\033[1;32m\n[+] Enter 'run' to execute the 'pscan' command.\n\033[1;m") - action_pscan = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan + action_pscan = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan if action_pscan == "back": option() elif action_pscan == "exit": @@ -246,7 +246,7 @@ def dos(): print("\033[1;32m\n[+] Enter 'run' to execute the 'dos' command.\n\033[1;m") - action_dos = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dos = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip() if action_dos == "back": option() @@ -284,7 +284,7 @@ def ping(): print("\033[1;32m\n[+] Enter 'run' to execute the 'ping' command.\n\033[1;m") - action_ping = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip() + action_ping = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip() if action_ping == "back": option() @@ -328,7 +328,7 @@ def ping(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def inject_html(): print("\033[1;32m\n[+] Enter 'run' to execute the 'injecthtml' command.\n\033[1;m") - action_inject = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip() + action_inject = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip() if action_inject == "back": option() elif action_inject == "exit": @@ -337,7 +337,7 @@ def inject_html(): home() elif action_inject == "run": print("\033[1;32m\n[+] Specify the file containing html code you would like to inject.\n\033[1;m") - html_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m") + html_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m") if html_file == "back": inject_html() @@ -369,7 +369,7 @@ def inject_html(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def rdownload(): print("\033[1;32m\n[+] Please type 'run' to execute the 'rdownload' command.\n\033[1;m") - action_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() + action_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() if action_rdownload == "back": option() elif action_rdownload == "exit": @@ -379,9 +379,9 @@ def rdownload(): elif action_rdownload == "run": module = "/opt/xerosploit/tools/bettercap/modules/http/replace_file.rb" print("\033[1;32m\n[+] Specify the extension of the files to replace. (e.g. exe)\n\033[1;m") - ext_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() + ext_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() print("\033[1;32m\n[+] Set the file to use in order to replace the ones matching the extension.\n\033[1;m") - file_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m") + file_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m") file_rdownload = file_rdownload.replace("'","") if file_rdownload == "back": rdownload() @@ -410,7 +410,7 @@ def rdownload(): def snif(): print("\033[1;32m\n[+] Please type 'run' to execute the 'sniff' command.\n\033[1;m") - action_snif = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_snif = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_snif == "back": option() elif action_snif == "exit": @@ -421,7 +421,7 @@ def snif(): def snif_sslstrip(): print("\033[1;32m\n[+] Do you want to load sslstrip ? (y/n).\n\033[1;m") - action_snif_sslstrip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_snif_sslstrip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_snif_sslstrip == "y": print("\033[1;34m\n[++] All logs are saved on : /opt/xerosploit/xerosniff \033[1;m") print("\033[1;34m\n[++] Sniffing on " + target_name + "\033[1;m") @@ -436,7 +436,7 @@ def snif_sslstrip(): cmd_snif = os.system("xettercap --proxy " + target_parse + target_ips + " -P MYSQL,SNPP,DHCP,WHATSAPP,RLOGIN,IRC,HTTPS,POST,PGSQL,NNTP,DICT,HTTPAUTH,TEAMVIEWER,MAIL,SNMP,MPD,COOKIE,NTLMSS,FTP,REDIS -I " + up_interface + " --gateway " + gateway + " -O, --log /opt/xerosploit/xerosniff/" + filename + ".log --sniffer-output /opt/xerosploit/xerosniff/" + filename + ".pcap") def snifflog(): print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m") - action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_log == "n": cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*") print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m") @@ -473,7 +473,7 @@ def snifflog(): def snifflog(): print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m") - action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_log == "n": cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*") print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m") @@ -522,7 +522,7 @@ def snifflog(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def dspoof(): print("\033[1;32m\n[+] Enter 'run' to execute the 'dspoof' command.\n\033[1;m") - action_dspoof = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dspoof = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() if action_dspoof == "back": option() elif action_dspoof == "exit": @@ -531,7 +531,7 @@ def dspoof(): home() elif action_dspoof == "run": print("\033[1;32m\n[+] Enter the IP address where you want to redirect the traffic.\n\033[1;m") - action_dspoof_ip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dspoof_ip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() dns_conf = action_dspoof_ip + " .*\.*" outdns = open('/opt/xerosploit/tools/files/dns.conf','w') outdns.write(dns_conf) @@ -556,7 +556,7 @@ def dspoof(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def yplay(): print("\033[1;32m\n[+] Enter 'run' to execute the 'yplay' command.\n\033[1;m") - action_yplay = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() + action_yplay = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() if action_yplay == "back": option() elif action_yplay == "exit": @@ -565,7 +565,7 @@ def yplay(): home() elif action_yplay == "run": print("\033[1;32m\n[+] Insert a youtube video ID. (e.g. NvhZu5M41Z8)\n\033[1;m") - video_id = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() + video_id = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() if video_id == "back": option() elif video_id == "": # if raw = null @@ -600,7 +600,7 @@ def yplay(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def replace(): print("\033[1;32m\n[+] Enter 'run' to execute the 'replace' command.\n\033[1;m") - action_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip() + action_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip() if action_replace == "back": option() elif action_replace == "exit": @@ -609,7 +609,7 @@ def replace(): home() elif action_replace == "run": print("\033[1;32m\n[+] Insert your image path. (e.g. /home/capitansalami/pictures/fun.png)\n\033[1;m") - img_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m") + img_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m") img_replace = img_replace.replace("'","") if img_replace == "back": replace() @@ -645,7 +645,7 @@ def replace(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def driftnet(): print("\033[1;32m\n[+] Enter 'run' to execute the 'driftnet' command.\n\033[1;m") - action_driftnet = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip() + action_driftnet = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip() if action_driftnet == "back": option() elif action_driftnet == "exit": @@ -675,7 +675,7 @@ def driftnet(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def shakescreen(): print("\033[1;32m\n[+] Enter 'run' to execute the 'move' command.\n\033[1;m") - action_shakescreen = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip() + action_shakescreen = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip() if action_shakescreen == "back": option() elif action_shakescreen == "exit": @@ -703,7 +703,7 @@ def shakescreen(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def inject_j(): print("\033[1;32m\n[+] Enter 'run' to execute the 'injectjs' command.\n\033[1;m") - action_inject_j = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip() + action_inject_j = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip() if action_inject_j == "back": option() elif action_inject_j == "exit": @@ -712,7 +712,7 @@ def inject_j(): home() elif action_inject_j == "run": print("\033[1;32m\n[+] Specify the file containing js code you would like to inject.\n\033[1;m") - js_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m") + js_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m") js_file = js_file.replace("'","") if js_file == "back": inject_j() @@ -742,7 +742,7 @@ def inject_j(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def deface(): print("\033[1;32m\n[+] Enter 'run' to execute the 'deface' command.\n\033[1;m") - action_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip() + action_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip() if action_deface == "back": option() elif action_deface == "exit": @@ -753,7 +753,7 @@ def deface(): print("\033[1;32m\n[+] Specify the file containing your defacement code .\033[1;m") print("\033[1;33m\n[!] Your file should not contain Javascript code .\n\033[1;m") - file_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m") + file_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m") if file_deface == "back": option() @@ -863,7 +863,7 @@ def deface(): def cmd0(): while True: print("\033[1;32m\n[+] Please type 'help' to view commands.\n\033[1;m") - cmd_0 = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() + cmd_0 = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() if cmd_0 == "scan": # Map the network print("\033[1;34m\n[++] Mapping your network ... \n\033[1;m") scan() @@ -879,7 +879,7 @@ def gateway(): print(table.table) print("\033[1;32m\n[+] Enter your network gateway.\n\033[1;m") - n_gateway = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip() + n_gateway = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip() if n_gateway == "back": home() @@ -906,7 +906,7 @@ def iface(): print(table.table) print("\033[1;32m\n[+] Enter your network interface.\n\033[1;m") - n_up_interface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip() + n_up_interface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip() if n_up_interface == "back": home() @@ -930,7 +930,7 @@ def iface(): elif cmd_0 == "rmlog": # Remove all logs def rm_log(): print("\033[1;32m\n[+] Do want to remove all xerosploit logs ? (y/n)\n\033[1;m") - cmd_rmlog = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip() + cmd_rmlog = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip() if cmd_rmlog == "y": rmlog = os.system("rm -f -R /opt/xerosploit/xerosniff/ /opt/xerosploit/tools/log/* /opt/xerosploit/tools/bettercap/modules/tmp/* /opt/xerosploit/tools/files/dns.conf") print("\033[1;31m\n[++] All logs have been removed. \n\033[1;m") From 6e5d38c2462a24f3b101ab4f417063f34c24b108 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:43:31 +0000 Subject: [PATCH 03/15] Cool :star: Manual --- README.md | 34 ++++++---------------------------- 1 file changed, 6 insertions(+), 28 deletions(-) diff --git a/README.md b/README.md index 7d82a16..2c38d9f 100644 --- a/README.md +++ b/README.md @@ -1,15 +1,9 @@ - -[![Version](https://img.shields.io/badge/Xerosploit-Version_1.0-brightgreen.svg?maxAge=259200)]() -[![PyPI](https://img.shields.io/badge/Python-2.7-blue.svg)]() +[![PyPI](https://img.shields.io/badge/Python-3-blue.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-linux-orange.svg)]() -[![AUR](https://img.shields.io/aur/license/yaourt.svg)]() Xerosploit = Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. -Powered by bettercap and nmap. - -![](http://i.imgur.com/bbr48Ep.png) Dependencies = @@ -30,8 +24,8 @@ Instalation = Dependencies will be automatically installed. - git clone https://github.com/LionSec/xerosploit - cd xerosploit && sudo python install.py + git clone https://github.com/hackerW1/xerosploit + cd xerosploit && sudo python3 install.py sudo xerosploit @@ -74,25 +68,9 @@ features - Drifnet - Webpage defacement and more ... -Demonstration -= -https://www.youtube.com/watch?v=35QUrtZEV9U - -I have some questions! -= - -Please visit https://github.com/LionSec/xerosploit/issues - -Donations -= -- Paypal : https://www.paypal.me/lionsec -- Bitcoin : 12dM5kZjYMizNuXaqu7QZBLNDkXjfKYpRD +## UPDATES -Contact +All Errors Fixed = -- Website : https://neodrix.com -- Youtube : https://youtube.com/inf98es -- Facebook : https://facebook.com/in98 -- Twitter: @LionSec1 -- Email : informatic98es@gmail.com +- LionSec's xerosploit has been old so this one can help those who are getting errors From d1acb2d734c433b59970351209455d1a6bca7925 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:45:57 +0000 Subject: [PATCH 04/15] Cool :star: Manual --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 2c38d9f..c2bdda8 100644 --- a/README.md +++ b/README.md @@ -47,7 +47,7 @@ Tested on