Created
March 19, 2015 18:48
-
-
Save KyxRecon/02c17c2ec708d4f2b4f4 to your computer and use it in GitHub Desktop.
sb-Venom.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
#sb-e Venom tool | |
#By :Alexcerus-HR | |
#Simple script cooded in bash scripting can give a help for crawling the files web and collecting email & #domains .... | |
#Available output types : | |
# doc = document files | |
# Pdf = files extracted from the Url targeted | |
# The harvester = tool can be found in our system for pentesting (search in the web & install it ).. | |
# Golismero = the web tool knife | |
# | |
again='y' | |
while [ $again == 'y' ] || [ $again == 'Y' ]; | |
do | |
clear | |
# | |
cyan='\e[0;36m' | |
green='\e[0;34m' | |
lightgreen='\e[1;32m' | |
white='\e[1;37m' | |
red='\e[1;31m' | |
yellow='\e[1;33m' | |
echo -e $yellow'sb-e Venom' | |
echo -e $white'By : Hood3dExplo1ter' | |
echo "" | |
echo -e $white"Usage : sb-e Venom.sh [options]" | |
echo -e $red "-f goofile tools can search for a specific file in a given domain" | |
echo -e $red "-t TheHarvester tools search email collector" | |
echo "" | |
echo -e $red "-c dirb (directory bruteforce)" | |
echo -e $red "-d URL Crazy tools for report Phising" | |
echo -e $red "-w GoLISMERO" | |
echo "" | |
echo -e $white "" | |
echo " f =>. File Crawler" | |
echo " t => The Harvester" | |
echo " c => Directory CraWler" | |
echo " d => Domain Crawler" | |
echo " w => The Web Knife" | |
echo " e => Exit" | |
echo "" | |
echo -n -e $yellow'Venom > '; tput sgr0 #insert your choice | |
read pass | |
if test $pass == 'f' | |
then | |
echo -n -e $cyan" set target >> "; tput sgr0 | |
read RHOST | |
echo -n -e $yellow" set Filetype [txt,pdf,doc] >> "; tput sgr0 | |
read filetype | |
goofile -d $RHOST -f $filetype | |
elif test $pass == 't' | |
then | |
echo -n -e $cyan" set target [target.com] >> "; tput sgr0 | |
read domain | |
theharvester -d $domain -l 50 -b google | |
elif test $pass == 'c' | |
then | |
echo -n -e $cyan" set URL [http://url/directory/] >> "; tput sgr0 | |
read domain | |
dirb "$domain" | |
elif test $pass == 'd' | |
then | |
echo -n -e $cyan" set domain [facebook.com] >> "; tput sgr0 | |
read passw0rm | |
urlcrazy -p $passw0rm | |
elif test $pass == 'w' | |
then | |
echo -n -e $cyan" set URL/Domain >> "; tput sgr0 | |
read url | |
golismero -t "$url" -c | |
elif test $pass == 'a' | |
then | |
cat about.txt | |
elif test $pass == 'e' | |
then | |
exit | |
fi | |
echo | |
echo -e -n "Return to menu [y/n] :"; | |
read again; | |
while [ $again != 'y' ] && [ $again != 'Y' ] && [ $again != 'n' ] && [ $again != 'N' ]; | |
do | |
echo -n "Return to menu [y/n] :"; | |
read again; | |
done | |
done |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment