Giter Site home page Giter Site logo

pythem's Introduction

PytheM

PytheM is a python pentesting framework. It has been developed in the hope that it will be useful and I don't take responsibility for any misapplication of it. Only runs on GNU/Linux OS, check wiki to see examples:
https://github.com/m4n3dw0lf/PytheM/wiki

#Installation

  • $sudo apt-get update

  • $sudo apt-get install libasound-dev libjack-jackd2-dev portaudio19-dev python-pyaudio build-essential python-dev libnetfilter-queue-dev libespeak1 libffi-dev libssl-dev

  • $sudo git clone https://github.com/m4n3dw0lf/PytheM/

  • $cd PytheM

  • $sudo pip install -r requirements.txt

Now you are ready to rock:

  • $sudo ./pythem

#Features

[ PytheM - Penetration Testing Framework v0.3.4 ]

[*] help:		Print the help message.


[*] exit/quit:		Leave the program.


[*] set			Set a variable's value.

parameters:

 - interface
 - gateway
 - target
 - file
 - arpmode

  examples:

   pythem> set interface         | open input to set
	  or
   pythem> set interface wlan0   | don't open input to set value


[*] print		Print a variable's value.

  examples:

   pythem> print gateway


[SECTION - NETWORK AND MAN-IN-THE-MIDDLE]


[*] scan		Make a tcp/manualport/arp scan.

(Should be called after setting interface and target)

  examples:

   pythem> scan
	  or
   pythem> scan tcp


[*] arpspoof		Start or stop an arpspoofing attack.

(Optional setting arpmode to select arpspoofing mode should be filled with rep or req) 
(rep to spoof responses, req to spoof requests)

arguments:

 start
 stop

  examples:
   arpspoof start
   arpspoof stop


[*] dnsspoof		Start a dnsspoofing attack.

(Should be called after an arpspoofing attack has been started)

  examples:

   pythem> dnsspoof start
   pythem> dnsspoof stop


[*] sniff		Start sniffing packets.

(Should be called after setting an interface)

  examples:

   pythem> sniff http
	  or
   pythem> sniff
   [+] Enter the filter: port 1337 and host 10.0.1.5  | tcpdump-like format or http, dns specific filter.


[*] pforensic		Start a packet-analyzer

(Should be called after setting interface and  a file with a .pcap file)

  examples:

   pythem> pforensic
   pforensic> help


[SECTION - EXPLOIT DEVELOPMENT AND REVERSE ENGINERING]


[*] xploit		Interactive stdin or tcp exploit development shell

(The stdin should be called after setting file)
(The tcp should be called after setting target)

arguments:
 stdin		| set file before
 tcp		| set target before
 
  examples:

   pythem> set file ./exec
   pythem> xploit stdin
   xploit> help


[*] fuzz		Start a local file stdin fuzzer or a tcp fuzzer

(The stdin should be called after setting file)
(The tcp should be called after setting target)

arguments:

 stdin		| set file before
 tcp		| set target before

  examples:

   pythem> fuzz stdin
   pythem> fuzz tcp


[SECTION - BRUTE-FORCE]


[*] brute-force		Start a brute-force attack.

(Should be called after setting a target and a wordlist file path)

arguments:

 ssh		| ip address as target
 url		| url (with http:// or https://) as target
 webform	| url (with http:// or https://) as target

  examples:

   pythem> brute-force webform
   pythem> brute-force ssh


[SECTION - UTILS]


[*] geoip		Approximately geolocate the location of an IP address.

(Should be called after setting target(ip address))

  examples:

   pythem> geoip
	  or
   pythem> geoip 8.8.8.8


[*] decode and encode	Decode or encode a string with a chosen pattern

  examples:

   pythem> decode base64
   pythem> encode ascii


[*] cookiedecode	Decode a base64 url encoded cookie value.

  example:

   pythem> cookiedecode


* Anything else will be executed in the terminal like cd, ls, nano, cat, etc. *

Jarvis - voice-controlled assistant

link: https://github.com/m4n3dw0lf/Jarvis

[*] jarvis

type jarvis-help to see the jarvis help page.

  examples:

   pythem> jarvis	  (Call Jarvis in speech recognition mode)

   pythem> jarvis-help    (Print the Jarvis help message)

   pythem> jarvis-log     (Check the Jarvis log)
	  or
   pythem> jarvis-log err

   pythem> jarvis-say     (Ask Jarvis to say something)
	  or
   pythem> jarvis-say hello my name is jarvis.

   pythem> jarvis-read 	  (If no file is specified, should be called after setting file.)
   	  or
   pythem> jarvis-read file.txt

by: m4n3dw0lf

pythem's People

Contributors

m4n3dw0lf avatar torchhound avatar

Watchers

James Cloos avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.