-
Notifications
You must be signed in to change notification settings - Fork 563
/
lazymux.py
965 lines (943 loc) · 54.3 KB
/
lazymux.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
## lazymux.py - Lazymux v4.0
##
import os, sys
import readline
from time import sleep as timeout
from core.lzmcore import *
def main():
banner()
print(" [01] Information Gathering")
print(" [02] Vulnerability Analysis")
print(" [03] Web Hacking")
print(" [04] Database Assessment")
print(" [05] Password Attacks")
print(" [06] Wireless Attacks")
print(" [07] Reverse Engineering")
print(" [08] Exploitation Tools")
print(" [09] Sniffing and Spoofing")
print(" [10] Reporting Tools")
print(" [11] Forensic Tools")
print(" [12] Stress Testing")
print(" [13] Install Linux Distro")
print(" [14] Termux Utility")
print(" [15] Shell Function [.bashrc]")
print(" [16] Install CLI Games")
print(" [17] Malware Analysis")
print(" [18] Compiler/Interpreter")
print(" [19] Social Engineering Tools")
print("\n [99] Update the Lazymux")
print(" [00] Exit the Lazymux\n")
lazymux = input("lzmx > set_install ")
# 01 - Information Gathering
if lazymux.strip() == "1" or lazymux.strip() == "01":
print("\n [01] Nmap: Utility for network discovery and security auditing")
print(" [02] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
print(" [03] D-TECT: All-In-One Tool for Penetration Testing")
print(" [04] sqlmap: Automatic SQL injection and database takeover tool")
print(" [05] Infoga: Tool for Gathering Email Accounts Informations")
print(" [06] ReconDog: Information Gathering and Vulnerability Scanner tool")
print(" [07] AndroZenmap")
print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [09] AstraNmap: Security scanner used to find hosts and services on a computer network")
print(" [10] MapEye: Accurate GPS Location Tracker (Android, IOS, Windows phones)")
print(" [11] Easymap: Nmap Shortcut")
print(" [12] BlackBox: A Penetration Testing Framework")
print(" [13] XD3v: Powerful tool that lets you know all the essential details about your phone")
print(" [14] Crips: This Tools is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records")
print(" [15] SIR: Resolve from the net the last known ip of a Skype Name")
print(" [16] EvilURL: Generate unicode evil domains for IDN Homograph Attack and detect them")
print(" [17] Striker: Recon & Vulnerability Scanning Suite")
print(" [18] Xshell: ToolKit")
print(" [19] OWScan: OVID Web Scanner")
print(" [20] OSIF: Open Source Information Facebook")
print(" [21] Devploit: Simple Information Gathering Tool")
print(" [22] Namechk: Osint tool based on namechk.com for checking usernames on more than 100 websites, forums and social networks")
print(" [23] AUXILE: Web Application Analysis Framework")
print(" [24] inther: Information gathering using shodan, censys and hackertarget")
print(" [25] GINF: GitHub Information Gathering Tool")
print(" [26] GPS Tracking")
print(" [27] ASU: Facebook Hacking ToolKit")
print(" [28] fim: Facebook Image Downloader")
print(" [29] MaxSubdoFinder: Tool for Discovering Subdomain")
print(" [30] pwnedOrNot: OSINT Tool for Finding Passwords of Compromised Email Accounts")
print(" [31] Mac-Lookup: Finds information about a Particular Mac address")
print(" [32] BillCipher: Information Gathering tool for a Website or IP address")
print(" [33] dnsrecon: Security assessment and network troubleshooting")
print(" [34] zphisher: Automated Phishing Tool")
print(" [35] Mr.SIP: SIP-Based Audit and Attack Tool")
print(" [36] Sherlock: Hunt down social media accounts by username")
print(" [37] userrecon: Find usernames across over 75 social networks")
print(" [38] PhoneInfoga: One of the most advanced tools to scan phone numbers using only free resources")
print(" [39] SiteBroker: A cross-platform python based utility for information gathering and penetration testing automation")
print(" [40] maigret: Collect a dossier on a person by username from thousands of sites")
print(" [41] GatheTOOL: Information Gathering - API hackertarget.com")
print(" [42] ADB-ToolKit")
print(" [43] TekDefense-Automater: Automater - IP URL and MD5 OSINT Analysis")
print(" [44] EagleEye: Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search")
print(" [45] EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible")
print(" [46] InSpy: A python based LinkedIn enumeration tool")
print(" [47] Leaked: Leaked? 2.1 - A Checking tool for Hash codes, Passwords and Emails leaked")
print(" [48] fierce: A DNS reconnaissance tool for locating non-contiguous IP space")
print(" [49] gasmask: Information gathering tool - OSINT")
print(" [50] osi.ig: Information Gathering (Instagram)")
print(" [51] proxy-checker: The simple script, which checks good and bad proxies")
print("\n [00] Back to main menu\n")
infogathering = input("lzmx > set_install ")
if infogathering == "@":
infogathering = ""
for x in range(1,201):
infogathering += f"{x} "
if len(infogathering.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for infox in infogathering.split():
if infox.strip() == "01" or infox.strip() == "1": nmap()
elif infox.strip() == "02" or infox.strip() == "2": red_hawk()
elif infox.strip() == "03" or infox.strip() == "3": dtect()
elif infox.strip() == "04" or infox.strip() == "4": sqlmap()
elif infox.strip() == "05" or infox.strip() == "5": infoga()
elif infox.strip() == "06" or infox.strip() == "6": reconDog()
elif infox.strip() == "07" or infox.strip() == "7": androZenmap()
elif infox.strip() == "08" or infox.strip() == "8": sqlmate()
elif infox.strip() == "09" or infox.strip() == "9": astraNmap()
elif infox.strip() == "10": mapeye()
elif infox.strip() == "11": easyMap()
elif infox.strip() == "12": blackbox()
elif infox.strip() == "13": xd3v()
elif infox.strip() == "14": crips()
elif infox.strip() == "15": sir()
elif infox.strip() == "16": evilURL()
elif infox.strip() == "17": striker()
elif infox.strip() == "18": xshell()
elif infox.strip() == "19": owscan()
elif infox.strip() == "20": osif()
elif infox.strip() == "21": devploit()
elif infox.strip() == "22": namechk()
elif infox.strip() == "23": auxile()
elif infox.strip() == "24": inther()
elif infox.strip() == "25": ginf()
elif infox.strip() == "26": gpstr()
elif infox.strip() == "27": asu()
elif infox.strip() == "28": fim()
elif infox.strip() == "29": maxsubdofinder()
elif infox.strip() == "30": pwnedOrNot()
elif infox.strip() == "31": maclook()
elif infox.strip() == "32": billcypher()
elif infox.strip() == "33": dnsrecon()
elif infox.strip() == "34": zphisher()
elif infox.strip() == "35": mrsip()
elif infox.strip() == "36": sherlock()
elif infox.strip() == "37": userrecon()
elif infox.strip() == "38": phoneinfoga()
elif infox.strip() == "39": sitebroker()
elif infox.strip() == "40": maigret()
elif infox.strip() == "41": gathetool()
elif infox.strip() == "42": adbtk()
elif infox.strip() == "43": tekdefense()
elif infox.strip() == "44": eagleeye()
elif infox.strip() == "45": eyewitness()
elif infox.strip() == "46": inspy()
elif infox.strip() == "47": leaked()
elif infox.strip() == "48": fierce()
elif infox.strip() == "49": gasmask()
elif infox.strip() == "50": osi_ig()
elif infox.strip() == "51": proxy_checker()
elif infox.strip() == "00" or infox.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 02 - Vulnerability Analysis
elif lazymux.strip() == "2" or lazymux.strip() == "02":
print("\n [01] Nmap: Utility for network discovery and security auditing")
print(" [02] AndroZenmap")
print(" [03] AstraNmap: Security scanner used to find hosts and services on a computer network")
print(" [04] Easymap: Nmap Shortcut")
print(" [05] Red Hawk: Information Gathering, Vulnerability Scanning and Crawling")
print(" [06] D-TECT: All-In-One Tool for Penetration Testing")
print(" [07] Damn Small SQLi Scanner: A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code")
print(" [08] SQLiv: massive SQL injection vulnerability scanner")
print(" [09] sqlmap: Automatic SQL injection and database takeover tool")
print(" [10] sqlscan: Quick SQL Scanner, Dorker, Webshell injector PHP")
print(" [11] Wordpresscan: WPScan rewritten in Python + some WPSeku ideas")
print(" [12] WPScan: Free wordPress security scanner")
print(" [13] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [14] termux-wordpresscan")
print(" [15] TM-scanner: websites vulnerability scanner for termux")
print(" [16] Rang3r: Multi Thread IP + Port Scanner")
print(" [17] Striker: Recon & Vulnerability Scanning Suite")
print(" [18] Routersploit: Exploitation Framework for Embedded Devices")
print(" [19] Xshell: ToolKit")
print(" [20] SH33LL: Shell Scanner")
print(" [21] BlackBox: A Penetration Testing Framework")
print(" [22] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [23] OWScan: OVID Web Scanner")
print(" [24] XPL-SEARCH: Search exploits in multiple exploit databases")
print(" [25] AndroBugs_Framework: An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications")
print(" [26] Clickjacking-Tester: A python script designed to check if the website if vulnerable of clickjacking and create a poc")
print(" [27] Sn1per: Attack Surface Management Platform | Sn1perSecurity LLC")
print("\n [00] Back to main menu\n")
vulnsys = input("lzmx > set_install ")
if vulnsys == "@":
vulnsys = ""
for x in range(1,201):
vulnsys += f"{x} "
if len(vulnsys.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for vulnx in vulnsys.split():
if vulnsys.strip() == "01" or vulnsys.strip() == "1": nmap()
elif vulnsys.strip() == "02" or vulnsys.strip() == "2": androZenmap()
elif vulnsys.strip() == "03" or vulnsys.strip() == "3": astraNmap()
elif vulnsys.strip() == "04" or vulnsys.strip() == "4": easyMap()
elif vulnsys.strip() == "05" or vulnsys.strip() == "5": red_hawk()
elif vulnsys.strip() == "06" or vulnsys.strip() == "6": dtect()
elif vulnsys.strip() == "07" or vulnsys.strip() == "7": dsss()
elif vulnsys.strip() == "08" or vulnsys.strip() == "8": sqliv()
elif vulnsys.strip() == "09" or vulnsys.strip() == "9": sqlmap()
elif vulnsys.strip() == "10": sqlscan()
elif vulnsys.strip() == "11": wordpreSScan()
elif vulnsys.strip() == "12": wpscan()
elif vulnsys.strip() == "13": sqlmate()
elif vulnsys.strip() == "14": wordpresscan()
elif vulnsys.strip() == "15": tmscanner()
elif vulnsys.strip() == "16": rang3r()
elif vulnsys.strip() == "17": striker()
elif vulnsys.strip() == "18": routersploit()
elif vulnsys.strip() == "19": xshell()
elif vulnsys.strip() == "20": sh33ll()
elif vulnsys.strip() == "21": blackbox()
elif vulnsys.strip() == "22": xattacker()
elif vulnsys.strip() == "23": owscan()
elif vulnsys.strip() == "24": xplsearch()
elif vulnsys.strip() == "25": androbugs()
elif vulnsys.strip() == "26": clickjacking()
elif vulnsys.strip() == "27": sn1per()
elif vulnsys.strip() == "00" or vulnsys.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 03 - Web Hacking
elif lazymux.strip() == "3" or lazymux.strip() == "03":
print("\n [01] sqlmap: Automatic SQL injection and database takeover tool")
print(" [02] WebDAV: WebDAV File Upload Exploiter")
print(" [03] MaxSubdoFinder: Tool for Discovering Subdomain")
print(" [04] Webdav Mass Exploit")
print(" [05] Atlas: Quick SQLMap Tamper Suggester")
print(" [06] sqldump: Dump sql result sites with easy")
print(" [07] Websploit: An advanced MiTM Framework")
print(" [08] sqlmate: A friend of SQLmap which will do what you always expected from SQLmap")
print(" [09] inther: Information gathering using shodan, censys and hackertarget")
print(" [10] HPB: HTML Pages Builder")
print(" [11] Xshell: ToolKit")
print(" [12] SH33LL: Shell Scanner")
print(" [13] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [14] XSStrike: Most advanced XSS Scanner")
print(" [15] Breacher: An advanced multithreaded admin panel finder")
print(" [16] OWScan: OVID Web Scanner")
print(" [17] ko-dork: A simple vuln web scanner")
print(" [18] ApSca: Powerful web penetration application")
print(" [19] amox: Find backdoor or shell planted on a site via dictionary attack")
print(" [20] FaDe: Fake deface with kindeditor, fckeditor and webdav")
print(" [21] AUXILE: Auxile Framework")
print(" [22] xss-payload-list: Cross Site Scripting ( XSS ) Vulnerability Payload List")
print(" [23] Xadmin: Admin Panel Finder")
print(" [24] CMSeeK: CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 180 other CMSs")
print(" [25] CMSmap: A python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs")
print(" [26] CrawlBox: Easy way to brute-force web directory")
print(" [27] LFISuite: Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner")
print(" [28] Parsero: Robots.txt audit tool")
print(" [29] Sn1per: Attack Surface Management Platform | Sn1perSecurity LLC")
print(" [30] Sublist3r: Fast subdomains enumeration tool for penetration testers")
print(" [31] WP-plugin-scanner: A tool to list plugins installed on a wordpress powered website")
print(" [32] WhatWeb: Next generation web scanner")
print(" [33] fuxploider: File upload vulnerability scanner and exploitation tool")
print("\n [00] Back to main menu\n")
webhack = input("lzmx > set_install ")
if webhack == "@":
webhack = ""
for x in range(1,201):
webhack += f"{x} "
if len(webhack.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for webhx in webhack.split():
if webhx.strip() == "01" or webhx.strip() == "1": sqlmap()
elif webhx.strip() == "02" or webhx.strip() == "2": webdav()
elif webhx.strip() == "03" or webhx.strip() == "3": maxsubdofinder()
elif webhx.strip() == "04" or webhx.strip() == "4": webmassploit()
elif webhx.strip() == "05" or webhx.strip() == "5": atlas()
elif webhx.strip() == "06" or webhx.strip() == "6": sqldump()
elif webhx.strip() == "07" or webhx.strip() == "7": websploit()
elif webhx.strip() == "08" or webhx.strip() == "8": sqlmate()
elif webhx.strip() == "09" or webhx.strip() == "9": inther()
elif webhx.strip() == "10": hpb()
elif webhx.strip() == "11": xshell()
elif webhx.strip() == "12": sh33ll()
elif webhx.strip() == "13": xattacker()
elif webhx.strip() == "14": xsstrike()
elif webhx.strip() == "15": breacher()
elif webhx.strip() == "16": owscan()
elif webhx.strip() == "17": kodork()
elif webhx.strip() == "18": apsca()
elif webhx.strip() == "19": amox()
elif webhx.strip() == "20": fade()
elif webhx.strip() == "21": auxile()
elif webhx.strip() == "22": xss_payload_list()
elif webhx.strip() == "23": xadmin()
elif webhx.strip() == "24": cmseek()
elif webhx.strip() == "25": cmsmap()
elif webhx.strip() == "26": crawlbox()
elif webhx.strip() == "27": lfisuite()
elif webhx.strip() == "28": parsero()
elif webhx.strip() == "29": sn1per()
elif webhx.strip() == "30": sublist3r()
elif webhx.strip() == "31": wppluginscanner()
elif webhx.strip() == "32": whatweb()
elif webhx.strip() == "33": fuxploider()
elif webhx.strip() == "00" or webhx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 04 - Database Assessment
elif lazymux.strip() == "4" or lazymux.strip() == "04":
print("\n [01] DbDat: DbDat performs numerous checks on a database to evaluate security")
print(" [02] sqlmap: Automatic SQL injection and database takeover tool")
print(" [03] NoSQLMap: Automated NoSQL database enumeration and web application exploitation tool")
print(" [04] audit_couchdb: Detect security issues, large or small, in a CouchDB server")
print(" [05] mongoaudit: An automated pentesting tool that lets you know if your MongoDB instances are properly secured")
print("\n [00] Back to main menu\n")
dbssm = input("lzmx > set_install ")
if dbssm == "@":
dbssm = ""
for x in range(1,201):
dbssm += f"{x} "
if len(dbssm.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for dbsx in dbssm.split():
if dbsx.strip() == "01" or dbsx.strip() == "1": dbdat()
elif dbsx.strip() == "02" or dbsx.strip() == "2": sqlmap()
elif dbsx.strip() == "03" or dbsx.strip() == "3": nosqlmap
elif dbsx.strip() == "04" or dbsx.strip() == "4": audit_couchdb()
elif dbsx.strip() == "05" or dbsx.strip() == "5": mongoaudit()
elif dbsx.strip() == "00" or dbsx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 05 - Password Attacks
elif lazymux.strip() == "5" or lazymux.strip() == "05":
print("\n [01] Hydra: Network logon cracker supporting different services")
print(" [02] FMBrute: Facebook Multi Brute Force")
print(" [03] HashID: Software to identify the different types of hashes")
print(" [04] Facebook Brute Force 3")
print(" [05] Black Hydra: A small program to shorten brute force sessions on hydra")
print(" [06] Hash Buster: Crack hashes in seconds")
print(" [07] FBBrute: Facebook Brute Force")
print(" [08] Cupp: Common User Passwords Profiler")
print(" [09] InstaHack: Instagram Brute Force")
print(" [10] Indonesian Wordlist")
print(" [11] Xshell")
print(" [12] Aircrack-ng: WiFi security auditing tools suite")
print(" [13] BlackBox: A Penetration Testing Framework")
print(" [14] Katak: An open source software login brute-forcer toolkit and hash decrypter")
print(" [15] Hasher: Hash cracker with auto detect hash")
print(" [16] Hash-Generator: Beautiful Hash Generator")
print(" [17] nk26: Nkosec Encode")
print(" [18] Hasherdotid: A tool for find an encrypted text")
print(" [19] Crunch: Highly customizable wordlist generator")
print(" [20] Hashcat: World's fastest and most advanced password recovery utility")
print(" [21] ASU: Facebook Hacking ToolKit")
print(" [22] Credmap: An open source tool that was created to bring awareness to the dangers of credential reuse")
print(" [23] BruteX: Automatically brute force all services running on a target")
print(" [24] Gemail-Hack: python script for Hack gmail account brute force")
print(" [25] GoblinWordGenerator: Python wordlist generator")
print(" [26] PyBozoCrack: A silly & effective MD5 cracker in Python")
print(" [27] brutespray: Brute-Forcing from Nmap output - Automatically attempts default creds on found services")
print(" [28] crowbar: Crowbar is brute forcing tool that can be used during penetration tests")
print(" [29] elpscrk: An Intelligent wordlist generator based on user profiling, permutations, and statistics")
print(" [30] fbht: Facebook Hacking Tool")
print("\n [00] Back to main menu\n")
passtak = input("lzmx > set_install ")
if passtak == "@":
passtak = ""
for x in range(1,201):
passtak += f"{x} "
if len(passtak.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for passx in passtak.split():
if passx.strip() == "01" or passx.strip() == "1": hydra()
elif passx.strip() == "02" or passx.strip() == "2": fmbrute()
elif passx.strip() == "03" or passx.strip() == "3": hashid()
elif passx.strip() == "04" or passx.strip() == "4": fbBrute()
elif passx.strip() == "05" or passx.strip() == "5": black_hydra()
elif passx.strip() == "06" or passx.strip() == "6": hash_buster()
elif passx.strip() == "07" or passx.strip() == "7": fbbrutex()
elif passx.strip() == "08" or passx.strip() == "8": cupp()
elif passx.strip() == "09" or passx.strip() == "9": instaHack()
elif passx.strip() == "10": indonesian_wordlist()
elif passx.strip() == "11": xshell()
elif passx.strip() == "12": aircrackng()
elif passx.strip() == "13": blackbox()
elif passx.strip() == "14": katak()
elif passx.strip() == "15": hasher()
elif passx.strip() == "16": hashgenerator()
elif passx.strip() == "17": nk26()
elif passx.strip() == "18": hasherdotid()
elif passx.strip() == "19": crunch()
elif passx.strip() == "20": hashcat()
elif passx.strip() == "21": asu()
elif passx.strip() == "22": credmap()
elif passx.strip() == "23": brutex()
elif passx.strip() == "24": gemailhack()
elif passx.strip() == "25": goblinwordgenerator()
elif passx.strip() == "26": pybozocrack()
elif passx.strip() == "27": brutespray()
elif passx.strip() == "28": crowbar()
elif passx.strip() == "29": elpscrk()
elif passx.strip() == "30": fbht()
elif passx.strip() == "00" or passx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 06 - Wireless Attacks
elif lazymux.strip() == "6" or lazymux.strip() == "06":
print("\n [01] Aircrack-ng: WiFi security auditing tools suite")
print(" [02] Wifite: An automated wireless attack tool")
print(" [03] Wifiphisher: The Rogue Access Point Framework")
print(" [04] Routersploit: Exploitation Framework for Embedded Devices")
print(" [05] PwnSTAR: (Pwn SofT-Ap scRipt) - for all your fake-AP needs!")
print(" [06] Pyrit: The famous WPA precomputed cracker, Migrated from Google")
print("\n [00] Back to main menu\n")
wiretak = input("lzmx > set_install ")
if wiretak == "@":
wiretak = ""
for x in range(1,201):
wiretak += f"{x} "
if len(wiretak.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for wirex in wiretak.split():
if wirex.strip() == "01" or wirex.strip() == "1": aircrackng()
elif wirex.strip() == "02" or wirex.strip() == "2": wifite()
elif wirex.strip() == "03" or wirex.strip() == "3": wifiphisher()
elif wirex.strip() == "04" or wirex.strip() == "4": routersploit()
elif wirex.strip() == "05" or wirex.strip() == "5": pwnstar()
elif wirex.strip() == "06" or wirex.strip() == "6": pyrit()
elif wirex.strip() == "00" or wirex.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 07 - Reverse Engineering
elif lazymux.strip() == "7" or lazymux.strip() == "07":
print("\n [01] Binary Exploitation")
print(" [02] jadx: DEX to JAVA Decompiler")
print(" [03] apktool: A utility that can be used for reverse engineering Android applications")
print(" [04] uncompyle6: Python cross-version byte-code decompiler")
print(" [05] ddcrypt: DroidScript APK Deobfuscator")
print(" [06] CFR: Yet another java decompiler")
print(" [07] UPX: Ultimate Packer for eXecutables")
print(" [08] pyinstxtractor: PyInstaller Extractor")
print(" [09] innoextract: A tool to unpack installers created by Inno Setup")
print(" [10] pycdc: C++ python bytecode disassembler and decompiler")
print(" [11] APKiD: Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android")
print(" [12] DTL-X: Python APK Reverser & Patcher Tool")
print(" [13] APKLeaks: Scanning APK file for URIs, endpoints & secrets")
print(" [14] apk-mitm: A CLI application that automatically prepares Android APK files for HTTPS inspection")
print(" [15] ssl-pinning-remover: An SSL Pinning Remover for Android Apps")
print(" [16] GEF: GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux")
print("\n [00] Back to main menu\n")
reversi = input("lzmx > set_install ")
if reversi == "@":
reversi = ""
for x in range(1,201):
reversi += f"{x} "
if len(reversi.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for revex in reversi.split():
if revex.strip() == "01" or revex.strip() == "1": binploit()
elif revex.strip() == "02" or revex.strip() == "2": jadx()
elif revex.strip() == "03" or revex.strip() == "3": apktool()
elif revex.strip() == "04" or revex.strip() == "4": uncompyle()
elif revex.strip() == "05" or revex.strip() == "5": ddcrypt()
elif revex.strip() == "06" or revex.strip() == "6": cfr()
elif revex.strip() == "07" or revex.strip() == "7": upx()
elif revex.strip() == "08" or revex.strip() == "8": pyinstxtractor()
elif revex.strip() == "09" or revex.strip() == "9": innoextract()
elif revex.strip() == "10": pycdc()
elif revex.strip() == "11": apkid()
elif revex.strip() == "12": dtlx()
elif revex.strip() == "13": apkleaks()
elif revex.strip() == "14": apkmitm()
elif revex.strip() == "15": ssl_pinning_remover()
elif revex.strip() == "16": gef()
elif revex.strip() == "00" or revex.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 08 - Exploitation Tools
elif lazymux.strip() == "8" or lazymux.strip() == "08":
print("\n [01] Metasploit: Advanced open-source platform for developing, testing and using exploit code")
print(" [02] commix: Automated All-in-One OS Command Injection and Exploitation Tool")
print(" [03] BlackBox: A Penetration Testing Framework")
print(" [04] Brutal: Payload for teensy like a rubber ducky but the syntax is different")
print(" [05] TXTool: An easy pentesting tool")
print(" [06] XAttacker: Website Vulnerability Scanner & Auto Exploiter")
print(" [07] Websploit: An advanced MiTM Framework")
print(" [08] Routersploit: Exploitation Framework for Embedded Devices")
print(" [09] A-Rat: Remote Administration Tool")
print(" [10] BAF: Blind Attacking Framework")
print(" [11] Gloom-Framework: Linux Penetration Testing Framework")
print(" [12] Zerodoor: A script written lazily for generating cross-platform backdoors on the go :)")
print("\n [00] Back to main menu\n")
exploitool = input("lzmx > set_install ")
if exploitool == "@":
exploitool = ""
for x in range(1,201):
exploitool += f"{x} "
if len(exploitool.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for explx in exploitool.split():
if explx.strip() == "01" or explx.strip() == "1": metasploit()
elif explx.strip() == "02" or explx.strip() == "2": commix()
elif explx.strip() == "03" or explx.strip() == "3": blackbox()
elif explx.strip() == "04" or explx.strip() == "4": brutal()
elif explx.strip() == "05" or explx.strip() == "5": txtool()
elif explx.strip() == "06" or explx.strip() == "6": xattacker()
elif explx.strip() == "07" or explx.strip() == "7": websploit()
elif explx.strip() == "08" or explx.strip() == "8": routersploit()
elif explx.strip() == "09" or explx.strip() == "9": arat()
elif explx.strip() == "10": baf()
elif explx.strip() == "11": gloomframework()
elif explx.strip() == "12": zerodoor()
elif explx.strip() == "00" or explx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 09 - Sniffing and Spoofing
elif lazymux.strip() == "9" or lazymux.strip() == "09":
print("\n [01] KnockMail: Verify if Email Exists")
print(" [02] tcpdump: A powerful command-line packet analyzer")
print(" [03] Ettercap: Comprehensive suite for MITM attacks, can sniff live connections, do content filtering on the fly and much more")
print(" [04] hping3: hping is a command-line oriented TCP/IP packet assembler/analyzer")
print(" [05] tshark: Network protocol analyzer and sniffer")
print("\n [00] Back to main menu\n")
sspoof = input("lzmx > set_install ")
if sspoof == "@":
sspoof = ""
for x in range(1,201):
sspoof += f"{x} "
if len(sspoof.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for sspx in sspoof.split():
if sspx.strip() == "01" or sspx.strip() == "1": knockmail()
elif sspx.strip() == "02" or sspx.strip() == "2": tcpdump()
elif sspx.strip() == "03" or sspx.strip() == "3": ettercap()
elif sspx.strip() == "04" or sspx.strip() == "4": hping3()
elif sspx.strip() == "05" or sspx.strip() == "5": tshark()
elif sspx.strip() == "00" or sspx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 10 - Reporting Tools
elif lazymux.strip() == "10":
print("\n [01] dos2unix: Converts between DOS and Unix text files")
print(" [02] exiftool: Utility for reading, writing and editing meta information in a wide variety of files")
print(" [03] iconv: Utility converting between different character encodings")
print(" [04] mediainfo: Command-line utility for reading information from media files")
print(" [05] pdfinfo: PDF document information extractor")
print("\n [00] Back to main menu\n")
reportls = input("lzmx > set_install ")
if reportls == "@":
reportls = ""
for x in range(1,201):
reportls += f"{x} "
if len(reportls.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for reportx in reportls.split():
if reportx.strip() == "01" or reportx.strip() == "1": dos2unix()
elif reportx.strip() == "02" or reportx.strip() == "2": exiftool()
elif reportx.strip() == "03" or reportx.strip() == "3": iconv()
elif reportx.strip() == "04" or reportx.strip() == "4": mediainfo()
elif reportx.strip() == "05" or reportx.strip() == "5": pdfinfo()
elif reportx.strip() == "00" or reportx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 11 - Forensic Tools
elif lazymux.strip() == "11":
print("\n [01] steghide: Embeds a message in a file by replacing some of the least significant bits")
print(" [02] tesseract: Tesseract is probably the most accurate open source OCR engine available")
print(" [03] sleuthkit: The Sleuth Kit (TSK) is a library for digital forensics tools")
print(" [04] CyberScan: Network's Forensics ToolKit")
print(" [05] binwalk: Firmware analysis tool")
print("\n [00] Back to main menu\n")
forensc = input("lzmx > set_install ")
if forensc == "@":
forensc = ""
for x in range(1,201):
forensc += f"{x} "
if len(forensc.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for forenx in forensc.split():
if forenx.strip() == "01" or forenx.strip() == "1": steghide()
elif forenx.strip() == "02" or forenx.strip() == "2": tesseract()
elif forenx.strip() == "03" or forenx.strip() == "3": sleuthkit()
elif forenx.strip() == "04" or forenx.strip() == "4": cyberscan()
elif forenx.strip() == "05" or forenx.strip() == "5": binwalk()
elif forenx.strip() == "00" or forenx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 12 - Stress Testing
elif lazymux.strip() == "12":
print("\n [01] Torshammer: Slow post DDOS tool")
print(" [02] Slowloris: Low bandwidth DoS tool")
print(" [03] Fl00d & Fl00d2: UDP Flood tool")
print(" [04] GoldenEye: GoldenEye Layer 7 (KeepAlive+NoCache) DoS test tool")
print(" [05] Xerxes: The most powerful DoS tool")
print(" [06] Planetwork-DDOS")
print(" [07] Xshell")
print(" [08] santet-online: Social Engineering Tool")
print(" [09] dost-attack: WebServer Attacking Tools")
print(" [10] DHCPig: DHCP exhaustion script written in python using scapy network library")
print("\n [00] Back to main menu\n")
stresstest = input("lzmx > set_install ")
if stresstest == "@":
stresstest = ""
for x in range(1,201):
stresstest += f"{x} "
if len(stresstest.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for stressx in stresstest.split():
if stressx.strip() == "01" or stressx.strip() == "1": torshammer()
elif stressx.strip() == "02" or stressx.strip() == "2": slowloris()
elif stressx.strip() == "03" or stressx.strip() == "3": fl00d12()
elif stressx.strip() == "04" or stressx.strip() == "4": goldeneye()
elif stressx.strip() == "05" or stressx.strip() == "5": xerxes()
elif stressx.strip() == "06" or stressx.strip() == "6": planetwork_ddos()
elif stressx.strip() == "07" or stressx.strip() == "7": xshell()
elif stressx.strip() == "08" or stressx.strip() == "8": sanlen()
elif stressx.strip() == "09" or stressx.strip() == "9": dostattack()
elif stressx.strip() == "10": dhcpig()
elif stressx.strip() == "00" or stressx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 13 - Install Linux Distro
elif lazymux.strip() == "13":
print("\n [01] Ubuntu (impish)")
print(" [02] Fedora")
print(" [03] Kali Nethunter")
print(" [04] Parrot")
print(" [05] Arch Linux")
print(" [06] Alpine Linux (edge)")
print(" [07] Debian (bullseye)")
print(" [08] Manjaro AArch64")
print(" [09] OpenSUSE (Tumbleweed)")
print(" [10] Void Linux")
print("\n [00] Back to main menu\n")
innudis = input("lzmx > set_install ")
if innudis == "@":
innudis = ""
for x in range(1,201):
innudis += f"{x} "
if len(innudis.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for innux in innudis.split():
if innux.strip() == "01" or innux.strip() == "1": ubuntu()
elif innux.strip() == "02" or innux.strip() == "2": fedora()
elif innux.strip() == "03" or innux.strip() == "3": nethunter()
elif innux.strip() == "04" or innux.strip() == "4": parrot()
elif innux.strip() == "05" or innux.strip() == "5": archlinux()
elif innux.strip() == "06" or innux.strip() == "6": alpine()
elif innux.strip() == "07" or innux.strip() == "7": debian()
elif innux.strip() == "08" or innux.strip() == "8": manjaroArm64()
elif innux.strip() == "09" or innux.strip() == "9": opensuse()
elif innux.strip() == "10": voidLinux()
elif innux.strip() == "00" or innux.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 14 - Termux Utility
elif lazymux.strip() == "14":
print("\n [01] SpiderBot: Curl website using random proxy and user agent")
print(" [02] Ngrok: tunnel local ports to public URLs and inspect traffic")
print(" [03] Sudo: sudo installer for Android")
print(" [04] google: Python bindings to the Google search engine")
print(" [05] kojawafft")
print(" [06] ccgen: Credit Card Generator")
print(" [07] VCRT: Virus Creator")
print(" [08] E-Code: PHP Script Encoder")
print(" [09] Termux-Styling")
print(" [11] xl-py: XL Direct Purchase Package")
print(" [12] BeanShell: A small, free, embeddable Java source interpreter with object scripting language features, written in Java")
print(" [13] vbug: Virus Maker")
print(" [14] Crunch: Highly customizable wordlist generator")
print(" [15] Textr: Simple tool for running text")
print(" [16] heroku: CLI to interact with Heroku")
print(" [17] RShell: Reverse shell for single listening")
print(" [18] TermPyter: Fix all error Jupyter installation on termux")
print(" [19] Numpy: The fundamental package for scientific computing with Python")
print(" [20] BTC-to-IDR-checker: Check the exchange rate virtual money currency to Indonesia Rupiah from Bitcoin.co.id API")
print(" [21] ClickBot: Earn money using telegram bot")
print(" [22] pandas: Powerful open-source data manipulation and analysis library")
print(" [23] jupyter-notebook: Interactive web application that allows users to create and share documents containing live code, equations, visualizations, and narrative text")
print("\n [00] Back to main menu\n")
moretool = input("lzmx > set_install ")
if moretool == "@":
moretool = ""
for x in range(1,201):
moretool += f"{x} "
if len(moretool.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for moret in moretool.split():
if moret.strip() == "01" or moret.strip() == "1": spiderbot()
elif moret.strip() == "02" or moret.strip() == "2": ngrok()
elif moret.strip() == "03" or moret.strip() == "3": sudo()
elif moret.strip() == "04" or moret.strip() == "4": google()
elif moret.strip() == "05" or moret.strip() == "5": kojawafft()
elif moret.strip() == "06" or moret.strip() == "6": ccgen()
elif moret.strip() == "07" or moret.strip() == "7": vcrt()
elif moret.strip() == "08" or moret.strip() == "8": ecode()
elif moret.strip() == "09" or moret.strip() == "9": stylemux()
elif moret.strip() == "10": passgencvar()
elif moret.strip() == "11": xlPy()
elif moret.strip() == "12": beanshell()
elif moret.strip() == "13": vbug()
elif moret.strip() == "14": crunch()
elif moret.strip() == "15": textr()
elif moret.strip() == "16": heroku()
elif moret.strip() == "17": rshell()
elif moret.strip() == "18": termpyter()
elif moret.strip() == "19": numpy()
elif moret.strip() == "20": btc2idr()
elif moret.strip() == "21": clickbot()
elif moret.strip() == "22": pandas()
elif moret.strip() == "23": notebook()
elif moret.strip() == "00" or moret.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 15 - Shell Function [.bashrc]
elif lazymux.strip() == "15":
print("\n [01] FBVid (FB Video Downloader)")
print(" [02] cast2video (Asciinema Cast Converter)")
print(" [03] iconset (AIDE App Icon)")
print(" [04] readme (GitHub README.md)")
print(" [05] makedeb (DEB Package Builder)")
print(" [06] quikfind (Search Files)")
print(" [07] pranayama (4-7-8 Relax Breathing)")
print(" [08] sqlc (SQLite Query Processor)")
print("\n [00] Back to main menu\n")
myshf = input("lzmx > set_install ")
if myshf == "@":
myshf = ""
for x in range(1,201):
myshf += f"{x} "
if len(myshf.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for mysh in myshf.split():
if mysh.strip() == "01" or mysh.strip() == "1": fbvid()
elif mysh.strip() == "02" or mysh.strip() == "2": cast2video()
elif mysh.strip() == "03" or mysh.strip() == "3": iconset()
elif mysh.strip() == "04" or mysh.strip() == "4": readme()
elif mysh.strip() == "05" or mysh.strip() == "5": makedeb()
elif mysh.strip() == "06" or mysh.strip() == "6": quikfind()
elif mysh.strip() == "07" or mysh.strip() == "7": pranayama()
elif mysh.strip() == "08" or mysh.strip() == "8": sqlc()
elif mysh.strip() == "00" or mysh.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 16 - Install CLI Games
elif lazymux.strip() == "16":
print("\n [01] Flappy Bird")
print(" [02] Street Car")
print(" [03] Speed Typing")
print(" [04] NSnake: The classic snake game with textual interface")
print(" [05] Moon buggy: Simple game where you drive a car across the moon's surface")
print(" [06] Nudoku: ncurses based sudoku game")
print(" [07] tty-solitaire")
print(" [08] Pacman4Console")
print("\n [00] Back to main menu\n")
cligam = input("lzmx > set_install ")
if cligam == "@":
cligam = ""
for x in range(1,201):
cligam += f"{x} "
if len(cligam.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for clig in cligam.split():
if clig.strip() == "01" or clig.strip() == "1": flappy_bird()
elif clig.strip() == "02" or clig.strip() == "2": street_car()
elif clig.strip() == "03" or clig.strip() == "3": speed_typing()
elif clig.strip() == "04" or clig.strip() == "4": nsnake()
elif clig.strip() == "05" or clig.strip() == "5": moon_buggy()
elif clig.strip() == "06" or clig.strip() == "6": nudoku()
elif clig.strip() == "07" or clig.strip() == "7": ttysolitaire()
elif clig.strip() == "08" or clig.strip() == "8": pacman4console()
elif clig.strip() == "00" or clig.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 17 - Malware Analysis
elif lazymux.strip() == "17":
print("\n [01] Lynis: Security Auditing and Rootkit Scanner")
print(" [02] Chkrootkit: A Linux Rootkit Scanners")
print(" [03] ClamAV: Antivirus Software Toolkit")
print(" [04] Yara: Tool aimed at helping malware researchers to identify and classify malware samples")
print(" [05] VirusTotal-CLI: Command line interface for VirusTotal")
print(" [06] avpass: Tool for leaking and bypassing Android malware detection system")
print(" [07] DKMC: Dont kill my cat - Malicious payload evasion tool")
print("\n [00] Back to main menu\n")
malsys = input("lzmx > set_install ")
if malsys == "@":
malsys = ""
for x in range(1,201):
malsys += f"{x} "
if len(malsys.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for malx in malsys.split():
if malx.strip() == "01" or malx.strip() == "1": lynis()
elif malx.strip() == "02" or malx.strip() == "2": chkrootkit()
elif malx.strip() == "03" or malx.strip() == "3": clamav()
elif malx.strip() == "04" or malx.strip() == "4": yara()
elif malx.strip() == "05" or malx.strip() == "5": virustotal()
elif malx.strip() == "06" or malx.strip() == "6": avpass()
elif malx.strip() == "07" or malx.strip() == "7": dkmc()
elif malx.strip() == "00" or malx.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 18 - Compiler/Interpreter
elif lazymux.strip() == "18":
print("\n [01] Python2: Python 2 programming language intended to enable clear programs")
print(" [02] ecj: Eclipse Compiler for Java")
print(" [03] Golang: Go programming language compiler")
print(" [04] ldc: D programming language compiler, built with LLVM")
print(" [05] Nim: Nim programming language compiler")
print(" [06] shc: Shell script compiler")
print(" [07] TCC: Tiny C Compiler")
print(" [08] PHP: Server-side, HTML-embedded scripting language")
print(" [09] Ruby: Dynamic programming language with a focus on simplicity and productivity")
print(" [10] Perl: Capable, feature-rich programming language")
print(" [11] Vlang: Simple, fast, safe, compiled language for developing maintainable software")
print(" [12] BeanShell: Small, free, embeddable, source level Java interpreter with object based scripting language features written in Java")
print(" [13] fp-compiler: Free Pascal is a 32, 64 and 16 bit professional Pascal compiler")
print(" [14] Octave: Scientific Programming Language")
print(" [15] BlogC: A blog compiler")
print(" [16] Dart: General-purpose programming language")
print(" [17] Yasm: Assembler supporting the x86 and AMD64 instruction sets")
print(" [18] Nasm: A cross-platform x86 assembler with an Intel-like syntax.")
print("\n [00] Back to main menu\n")
compter = input("lzmx > set_install ")
if compter == "@":
compter = ""
for x in range(1,201):
compter += f"{x} "
if len(compter.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for compt in compter.split():
if compt.strip() == "01" or compt.strip() == "1": python2()
elif compt.strip() == "02" or compt.strip() == "2": ecj()
elif compt.strip() == "03" or compt.strip() == "3": golang()
elif compt.strip() == "04" or compt.strip() == "4": ldc()
elif compt.strip() == "05" or compt.strip() == "5": nim()
elif compt.strip() == "06" or compt.strip() == "6": shc()
elif compt.strip() == "07" or compt.strip() == "7": tcc()
elif compt.strip() == "08" or compt.strip() == "8": php()
elif compt.strip() == "09" or compt.strip() == "9": ruby()
elif compt.strip() == "10": perl()
elif compt.strip() == "11": vlang()
elif compt.strip() == "12": beanshell()
elif compt.strip() == "13": fpcompiler()
elif compt.strip() == "14": octave()
elif compt.strip() == "15": blogc()
elif compt.strip() == "16": dart()
elif compt.strip() == "17": yasm()
elif compt.strip() == "18": nasm()
elif compt.strip() == "00" or compt.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
# 19 - Social Engineering Tools
elif lazymux.strip() == "19":
print("\n [01] weeman: HTTP server for phishing in python")
print(" [02] SocialFish: Educational Phishing Tool & Information Collector")
print(" [03] santet-online: Social Engineering Tool")
print(" [04] SpazSMS: Send unsolicited messages repeatedly on the same phone number")
print(" [05] LiteOTP: Multi Spam SMS OTP")
print(" [06] F4K3: Fake User Data Generator")
print(" [07] Hac")
print(" [08] Cookie-stealer: Crappy cookie stealer")
print(" [09] zphisher: Automated Phishing Tool")
print(" [10] Evilginx: Advanced Phishing With Two-factor Authentication Bypass")
print(" [11] ghost-phisher: Automatically exported from code.google.com/p/ghost-phisher")
print("\n [00] Back to main menu\n")
soceng = input("lzmx > set_install ")
if soceng == "@":
soceng = ""
for x in range(1,201):
soceng += f"{x} "
if len(soceng.split()) > 1:
writeStatus(1)
else:
writeStatus(0)
for socng in soceng.split():
if socng.strip() == "01" or socng.strip() == "1": weeman()
elif socng.strip() == "02" or socng.strip() == "2": socfish()
elif socng.strip() == "03" or socng.strip() == "3": sanlen()
elif socng.strip() == "04" or socng.strip() == "4": spazsms()
elif socng.strip() == "05" or socng.strip() == "5": liteotp()
elif socng.strip() == "06" or socng.strip() == "6": f4k3()
elif socng.strip() == "07" or socng.strip() == "7": hac()
elif socng.strip() == "08" or socng.strip() == "8": cookiestealer()
elif socng.strip() == "09" or socng.strip() == "9": zphisher()
elif socng.strip() == "10": evilginx()
elif socng.strip() == "11": ghostphisher()
elif socng.strip() == "00" or socng.strip() == "0": restart_program()
else: print("\nERROR: Wrong Input");timeout(1);restart_program()
if readStatus():
writeStatus(0)
elif lazymux.strip() == "99":
os.system("git pull")
elif lazymux.strip() == "0" or lazymux.strip() == "00":
sys.exit()
else:
print("\nERROR: Wrong Input")
timeout(1)
restart_program()
if __name__ == "__main__":
os.system("clear")
main()