Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked NETOOL.sh V2.4


sQuo

Recommended Posts

This is the hidden content, please

 

This is the hidden content, please

 

This is the hidden content, please

 

Download

This is the hidden content, please

Description

 

netool.sh {bash script} V2.4

Operative Systems Suported: Linux, BSD, Mac osx,Backtrack

 

Dependencies:

 

zenmap (nmap-gui)

ettercap-ng

driftnet

sslstrip

macchanger

metasploit

 

description of the script *

 

netool.sh is a script in bash to automate frameworks like Nmap,Driftnet,SSLstrip and ettercap MITM attacks also uses macchanger to decoy scans, then uses nmap to search for a specified port open in external lan, change/see your mac address, change my PC hostname.

this script makes it easy tasks such as SNIFFING, MITM, SSLsniff, retrieve metadata, and DoS attacks inside the external/local network can also perform TCP/UDP packets manipulation using etter.filters also as the hability of capture pictures of web-browser surfing on the target machine under MITM attack and preforms a vuln scan to target web-site using websecurify addon , also uses [msfpayload+msfencode+msfcli] to have remote control of target machine, also came with [root3.rb] meterpreter ruby auxiliary script

 

Features

 

Ping remote target or web domain

Show Local Connections (see my machine connections)

Show my Ip address and arp cache

see/change macaddress

change my PC hostname

Scan Local network (search for live hosts inside local network)

search in external lan for hosts

Scan remote host (using nmap to perform a scan to target machine)

execute Nmap command (direct from shell)

Open router config page

search for target geo-location

Ip tracer whois (open website database whois and geo-location)

WebCrawler (open websecurify webcrawler website)

DDoS java Script (perform DDoS attacks external network)

Retrieve metadata (from a web-domain)

Config ettercap (etter.conf))

Launch MITM (using ettercap to perform MITM)

show URLs visited (by target machine under MITM)

Sniff remote pics (by target machine under MITM)

sniff SSL-HTTPS logins

Dns-Spoofing (redirect web-domains to another ip address)

DoS attack (local netwok)

Compile etter.filters

execute ettercap filter

make/encode payloads [metasplit]

edit/execute root3.rb on a meterpreter session open

start a listener [metasploit]

webcrawler

d. Delete lock folders

a. about netool

q. quit

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.