Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked NETOOL.sh V2.1


sQuo

Recommended Posts

This is the hidden content, please

 

This is the hidden content, please

 

This is the hidden content, please

 

 

This is the hidden content, please

 

 

This is the hidden content, please

 

 

Description

 

netool.sh {bash script} V2.1

Operative Systems Suported: Linux, BSD, Mac osx,Backtrack

 

Dependencies:

zenmap (nmap-gui)

ettercap-ng

driftnet

sslstrip

macchanger

metasploit

 

description of the script *

netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip, and ettercap MITM attacks. also uses macchanger to decoy scans,this script makes it easy tasks such as SNIFFING, MITM, SSLsniff, Retrieve metadata, and DoS attacks inside the local network, can also perform TCP/UDP packets manipulation using etter.filters, also as the hability of capture pictures of web-browser surfing of the target machine under MITM attack and preforms a vuln scan of the target web-site using websecurify addon , also uses metasploit modules [msfpayload+msfencode+msfcli] to have remote control of target machine...

 

video tutorial V2.1

 

[video=youtube_share;dZTrAuaR734]

This is the hidden content, please

 

 

Features

 

Ping remote target or web domain

Show Local Connections (see my machine connections)

Show my Ip address and arp cache

see/change macaddress

Scan Local network (search for live hosts inside local network)

search in external lan for hosts

Scan remote host (using nmap to perform a scan to target machine)

execute Nmap command (direct from shell)

Open router config page

Ip tracer whois (open website database whois and geo-location)

WebCrawler (open websecurify webcrawler website)

DDoS java Script (perform DDoS attacks external network)

Retrieve metadata (from a web-domain)

Config ettercap (etter.conf))

Launch MITM (using ettercap to perform MITM)

show URLs visited (by target machine under MITM)

Sniff remote pics (by target machine under MITM)

sniff SSL-HTTPS logins

Dns-Spoofing (redirect web-domains to another ip address)

DoS attack (local netwok)

Compile etter.filters

execute ettercap filter

make/encode payloads [metasplit]

start a listener [metasploit]

d. Delete lock folders

q. quit

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.