Spaces:
Running
Running
Add 3 files
Browse files- README.md +6 -4
- index.html +788 -19
- prompts.txt +0 -0
README.md
CHANGED
|
@@ -1,10 +1,12 @@
|
|
| 1 |
---
|
| 2 |
-
title:
|
| 3 |
-
emoji:
|
| 4 |
colorFrom: blue
|
| 5 |
-
colorTo:
|
| 6 |
sdk: static
|
| 7 |
pinned: false
|
|
|
|
|
|
|
| 8 |
---
|
| 9 |
|
| 10 |
-
Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
|
|
|
|
| 1 |
---
|
| 2 |
+
title: hacktool
|
| 3 |
+
emoji: π³
|
| 4 |
colorFrom: blue
|
| 5 |
+
colorTo: red
|
| 6 |
sdk: static
|
| 7 |
pinned: false
|
| 8 |
+
tags:
|
| 9 |
+
- deepsite
|
| 10 |
---
|
| 11 |
|
| 12 |
+
Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
|
index.html
CHANGED
|
@@ -1,19 +1,788 @@
|
|
| 1 |
-
<!
|
| 2 |
-
<html>
|
| 3 |
-
|
| 4 |
-
|
| 5 |
-
|
| 6 |
-
|
| 7 |
-
|
| 8 |
-
|
| 9 |
-
|
| 10 |
-
|
| 11 |
-
|
| 12 |
-
|
| 13 |
-
|
| 14 |
-
|
| 15 |
-
|
| 16 |
-
|
| 17 |
-
|
| 18 |
-
|
| 19 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
<!DOCTYPE html>
|
| 2 |
+
<html lang="en">
|
| 3 |
+
<head>
|
| 4 |
+
<meta charset="UTF-8">
|
| 5 |
+
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
| 6 |
+
<title>HackTool Pro - macOS</title>
|
| 7 |
+
<script src="https://cdn.tailwindcss.com"></script>
|
| 8 |
+
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.4.0/css/all.min.css">
|
| 9 |
+
<style>
|
| 10 |
+
@keyframes blink {
|
| 11 |
+
0%, 100% { opacity: 1; }
|
| 12 |
+
50% { opacity: 0; }
|
| 13 |
+
}
|
| 14 |
+
.cursor-blink {
|
| 15 |
+
animation: blink 1s step-end infinite;
|
| 16 |
+
}
|
| 17 |
+
.window {
|
| 18 |
+
box-shadow: 0 10px 30px rgba(0, 0, 0, 0.2);
|
| 19 |
+
border-radius: 8px;
|
| 20 |
+
overflow: hidden;
|
| 21 |
+
}
|
| 22 |
+
.terminal-bg {
|
| 23 |
+
background-color: #1a1a1a;
|
| 24 |
+
}
|
| 25 |
+
.scrollbar-hide::-webkit-scrollbar {
|
| 26 |
+
display: none;
|
| 27 |
+
}
|
| 28 |
+
.command-history {
|
| 29 |
+
height: calc(100% - 40px);
|
| 30 |
+
}
|
| 31 |
+
.macos-traffic-light {
|
| 32 |
+
width: 12px;
|
| 33 |
+
height: 12px;
|
| 34 |
+
border-radius: 50%;
|
| 35 |
+
margin-right: 8px;
|
| 36 |
+
}
|
| 37 |
+
.sidebar-item:hover {
|
| 38 |
+
background-color: rgba(255, 255, 255, 0.1);
|
| 39 |
+
}
|
| 40 |
+
.sidebar-item.active {
|
| 41 |
+
background-color: rgba(0, 122, 255, 0.2);
|
| 42 |
+
border-left: 3px solid #007aff;
|
| 43 |
+
}
|
| 44 |
+
.typewriter {
|
| 45 |
+
overflow: hidden;
|
| 46 |
+
white-space: nowrap;
|
| 47 |
+
margin: 0 auto;
|
| 48 |
+
letter-spacing: 0.15em;
|
| 49 |
+
}
|
| 50 |
+
</style>
|
| 51 |
+
</head>
|
| 52 |
+
<body class="bg-gray-900 text-white h-screen overflow-hidden flex items-center justify-center p-4">
|
| 53 |
+
<div class="window w-full max-w-6xl h-[90vh] flex flex-col">
|
| 54 |
+
<!-- Title Bar -->
|
| 55 |
+
<div class="bg-gray-800 rounded-t-lg flex items-center px-4 py-2">
|
| 56 |
+
<div class="flex mr-4">
|
| 57 |
+
<div class="macos-traffic-light bg-red-500"></div>
|
| 58 |
+
<div class="macos-traffic-light bg-yellow-500"></div>
|
| 59 |
+
<div class="macos-traffic-light bg-green-500"></div>
|
| 60 |
+
</div>
|
| 61 |
+
<div class="text-sm font-medium text-gray-300 flex-1 text-center">
|
| 62 |
+
HackTool Pro - Terminal
|
| 63 |
+
</div>
|
| 64 |
+
<div class="text-xs text-gray-500">
|
| 65 |
+
v2.4.1
|
| 66 |
+
</div>
|
| 67 |
+
</div>
|
| 68 |
+
|
| 69 |
+
<!-- Main Content -->
|
| 70 |
+
<div class="flex flex-1 overflow-hidden">
|
| 71 |
+
<!-- Sidebar -->
|
| 72 |
+
<div class="w-64 bg-gray-800 p-4 flex flex-col">
|
| 73 |
+
<div class="mb-6">
|
| 74 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Quick Actions</div>
|
| 75 |
+
<button class="bg-blue-600 hover:bg-blue-700 text-white px-3 py-1 rounded text-sm w-full mb-2 flex items-center">
|
| 76 |
+
<i class="fas fa-bolt mr-2"></i> Quick Scan
|
| 77 |
+
</button>
|
| 78 |
+
<button class="bg-green-600 hover:bg-green-700 text-white px-3 py-1 rounded text-sm w-full flex items-center">
|
| 79 |
+
<i class="fas fa-shield-alt mr-2"></i> Defense Mode
|
| 80 |
+
</button>
|
| 81 |
+
</div>
|
| 82 |
+
|
| 83 |
+
<div class="mb-6">
|
| 84 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Hacking Tools</div>
|
| 85 |
+
<div class="space-y-1">
|
| 86 |
+
<div class="sidebar-item active px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
| 87 |
+
<i class="fas fa-terminal mr-2 text-blue-400"></i> Terminal
|
| 88 |
+
</div>
|
| 89 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
| 90 |
+
<i class="fas fa-network-wired mr-2 text-purple-400"></i> Network Scanner
|
| 91 |
+
</div>
|
| 92 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
| 93 |
+
<i class="fas fa-lock mr-2 text-yellow-400"></i> Password Cracker
|
| 94 |
+
</div>
|
| 95 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
| 96 |
+
<i class="fas fa-code mr-2 text-red-400"></i> Exploit Database
|
| 97 |
+
</div>
|
| 98 |
+
</div>
|
| 99 |
+
</div>
|
| 100 |
+
|
| 101 |
+
<div class="mb-6 flex-1">
|
| 102 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Preset Commands</div>
|
| 103 |
+
<div class="bg-gray-700 rounded p-2 h-64 overflow-y-auto scrollbar-hide">
|
| 104 |
+
<div class="grid grid-cols-2 gap-2">
|
| 105 |
+
<button onclick="runPresetCommand(1)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">1. Port Scan</button>
|
| 106 |
+
<button onclick="runPresetCommand(2)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">2. Ping Sweep</button>
|
| 107 |
+
<button onclick="runPresetCommand(3)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">3. DNS Enum</button>
|
| 108 |
+
<button onclick="runPresetCommand(4)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">4. WHOIS Lookup</button>
|
| 109 |
+
<button onclick="runPresetCommand(5)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">5. Subdomain Brute</button>
|
| 110 |
+
<button onclick="runPresetCommand(6)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">6. HTTP Header</button>
|
| 111 |
+
<button onclick="runPresetCommand(7)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">7. SSL Check</button>
|
| 112 |
+
<button onclick="runPresetCommand(8)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">8. SQL Injection</button>
|
| 113 |
+
<button onclick="runPresetCommand(9)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">9. XSS Test</button>
|
| 114 |
+
<button onclick="runPresetCommand(10)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">10. CSRF Test</button>
|
| 115 |
+
<button onclick="runPresetCommand(11)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">11. Brute Force</button>
|
| 116 |
+
<button onclick="runPresetCommand(12)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">12. Hash Crack</button>
|
| 117 |
+
<button onclick="runPresetCommand(13)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">13. Wifi Scan</button>
|
| 118 |
+
<button onclick="runPresetCommand(14)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">14. ARP Spoof</button>
|
| 119 |
+
<button onclick="runPresetCommand(15)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">15. MAC Changer</button>
|
| 120 |
+
<button onclick="runPresetCommand(16)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">16. Packet Sniff</button>
|
| 121 |
+
<button onclick="runPresetCommand(17)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">17. MITM Attack</button>
|
| 122 |
+
<button onclick="runPresetCommand(18)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">18. DOS Attack</button>
|
| 123 |
+
<button onclick="runPresetCommand(19)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">19. SSH Brute</button>
|
| 124 |
+
<button onclick="runPresetCommand(20)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">20. FTP Brute</button>
|
| 125 |
+
<button onclick="runPresetCommand(21)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">21. RDP Brute</button>
|
| 126 |
+
<button onclick="runPresetCommand(22)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">22. SMTP Enum</button>
|
| 127 |
+
<button onclick="runPresetCommand(23)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">23. SNMP Walk</button>
|
| 128 |
+
<button onclick="runPresetCommand(24)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">24. LDAP Enum</button>
|
| 129 |
+
<button onclick="runPresetCommand(25)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">25. SMB Enum</button>
|
| 130 |
+
<button onclick="runPresetCommand(26)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">26. NFS Enum</button>
|
| 131 |
+
<button onclick="runPresetCommand(27)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">27. MySQL Brute</button>
|
| 132 |
+
<button onclick="runPresetCommand(28)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">28. MSSQL Brute</button>
|
| 133 |
+
<button onclick="runPresetCommand(29)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">29. Oracle Brute</button>
|
| 134 |
+
<button onclick="runPresetCommand(30)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">30. Postgres Brute</button>
|
| 135 |
+
<button onclick="runPresetCommand(31)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">31. Redis Brute</button>
|
| 136 |
+
<button onclick="runPresetCommand(32)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">32. MongoDB Brute</button>
|
| 137 |
+
<button onclick="runPresetCommand(33)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">33. Elastic Brute</button>
|
| 138 |
+
<button onclick="runPresetCommand(34)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">34. Jenkins Brute</button>
|
| 139 |
+
<button onclick="runPresetCommand(35)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">35. Docker Enum</button>
|
| 140 |
+
<button onclick="runPresetCommand(36)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">36. Kubernetes Enum</button>
|
| 141 |
+
<button onclick="runPresetCommand(37)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">37. AWS Enum</button>
|
| 142 |
+
<button onclick="runPresetCommand(38)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">38. Azure Enum</button>
|
| 143 |
+
<button onclick="runPresetCommand(39)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">39. GCP Enum</button>
|
| 144 |
+
<button onclick="runPresetCommand(40)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">40. Metasploit</button>
|
| 145 |
+
</div>
|
| 146 |
+
</div>
|
| 147 |
+
</div>
|
| 148 |
+
|
| 149 |
+
<div class="text-xs text-gray-500 text-center">
|
| 150 |
+
Connected: <span class="text-green-400">localhost</span>
|
| 151 |
+
</div>
|
| 152 |
+
</div>
|
| 153 |
+
|
| 154 |
+
<!-- Terminal -->
|
| 155 |
+
<div class="flex-1 flex flex-col terminal-bg">
|
| 156 |
+
<div class="p-4 border-b border-gray-700 flex items-center">
|
| 157 |
+
<div class="flex-1">
|
| 158 |
+
<div class="text-sm font-medium">Terminal Session</div>
|
| 159 |
+
<div class="text-xs text-gray-500">Interactive hacking console</div>
|
| 160 |
+
</div>
|
| 161 |
+
<div class="flex space-x-2">
|
| 162 |
+
<button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
|
| 163 |
+
<i class="fas fa-cog text-gray-400 text-sm"></i>
|
| 164 |
+
</button>
|
| 165 |
+
<button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
|
| 166 |
+
<i class="fas fa-expand text-gray-400 text-sm"></i>
|
| 167 |
+
</button>
|
| 168 |
+
</div>
|
| 169 |
+
</div>
|
| 170 |
+
|
| 171 |
+
<div class="flex-1 p-4 overflow-y-auto scrollbar-hide command-history" id="terminal-output">
|
| 172 |
+
<div class="text-green-400 mb-4">
|
| 173 |
+
<div class="flex items-baseline">
|
| 174 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
| 175 |
+
<span class="text-gray-500 mx-1">@</span>
|
| 176 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
| 177 |
+
<span class="text-gray-500 mx-1">~</span>
|
| 178 |
+
<span class="text-gray-500">$</span>
|
| 179 |
+
<span class="ml-2 typewriter" style="width: 350px;">Welcome to HackTool Pro v2.4.1 - Ethical Hacking Terminal</span>
|
| 180 |
+
</div>
|
| 181 |
+
</div>
|
| 182 |
+
<div class="text-gray-400 text-sm mb-4">
|
| 183 |
+
Type <span class="text-blue-400">help</span> to see available commands or click on preset commands from the sidebar.
|
| 184 |
+
</div>
|
| 185 |
+
<div class="text-gray-400 text-sm mb-4">
|
| 186 |
+
<div class="flex items-baseline">
|
| 187 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
| 188 |
+
<span class="text-gray-500 mx-1">@</span>
|
| 189 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
| 190 |
+
<span class="text-gray-500 mx-1">~</span>
|
| 191 |
+
<span class="text-gray-500">$</span>
|
| 192 |
+
<span class="ml-2">Initializing system...</span>
|
| 193 |
+
</div>
|
| 194 |
+
<div class="ml-8 text-green-400">β Security protocols enabled</div>
|
| 195 |
+
<div class="ml-8 text-green-400">β Command modules loaded</div>
|
| 196 |
+
<div class="ml-8 text-green-400">β Network interfaces ready</div>
|
| 197 |
+
</div>
|
| 198 |
+
</div>
|
| 199 |
+
|
| 200 |
+
<div class="p-4 border-t border-gray-700">
|
| 201 |
+
<div class="flex items-center">
|
| 202 |
+
<span class="text-green-400 font-mono mr-2">$</span>
|
| 203 |
+
<input type="text" id="command-input" class="bg-transparent border-none outline-none flex-1 font-mono text-green-400" placeholder="Enter command..." autofocus>
|
| 204 |
+
<button class="ml-2 bg-blue-600 hover:bg-blue-700 px-3 py-1 rounded text-sm" onclick="executeCommand()">
|
| 205 |
+
Run
|
| 206 |
+
</button>
|
| 207 |
+
</div>
|
| 208 |
+
</div>
|
| 209 |
+
</div>
|
| 210 |
+
</div>
|
| 211 |
+
|
| 212 |
+
<!-- Status Bar -->
|
| 213 |
+
<div class="bg-gray-800 rounded-b-lg px-4 py-2 flex items-center justify-between text-xs">
|
| 214 |
+
<div class="text-gray-400">
|
| 215 |
+
<span class="text-green-400">Ready</span> | <span>CPU: 12%</span> | <span>MEM: 34%</span>
|
| 216 |
+
</div>
|
| 217 |
+
<div class="flex items-center space-x-4">
|
| 218 |
+
<div class="flex items-center text-gray-400">
|
| 219 |
+
<i class="fas fa-shield-alt mr-1 text-green-400"></i>
|
| 220 |
+
<span>Secure</span>
|
| 221 |
+
</div>
|
| 222 |
+
<div class="flex items-center text-gray-400">
|
| 223 |
+
<i class="fas fa-network-wired mr-1 text-blue-400"></i>
|
| 224 |
+
<span>192.168.1.105</span>
|
| 225 |
+
</div>
|
| 226 |
+
<div class="flex items-center text-gray-400">
|
| 227 |
+
<i class="fas fa-clock mr-1 text-yellow-400"></i>
|
| 228 |
+
<span id="current-time"></span>
|
| 229 |
+
</div>
|
| 230 |
+
</div>
|
| 231 |
+
</div>
|
| 232 |
+
</div>
|
| 233 |
+
|
| 234 |
+
<script>
|
| 235 |
+
// Update current time
|
| 236 |
+
function updateTime() {
|
| 237 |
+
const now = new Date();
|
| 238 |
+
document.getElementById('current-time').textContent = now.toLocaleTimeString();
|
| 239 |
+
}
|
| 240 |
+
setInterval(updateTime, 1000);
|
| 241 |
+
updateTime();
|
| 242 |
+
|
| 243 |
+
// Command history
|
| 244 |
+
let commandHistory = [];
|
| 245 |
+
let historyIndex = -1;
|
| 246 |
+
|
| 247 |
+
// Terminal functions
|
| 248 |
+
const terminalOutput = document.getElementById('terminal-output');
|
| 249 |
+
const commandInput = document.getElementById('command-input');
|
| 250 |
+
|
| 251 |
+
// Focus input on any click in the terminal
|
| 252 |
+
document.addEventListener('click', () => {
|
| 253 |
+
commandInput.focus();
|
| 254 |
+
});
|
| 255 |
+
|
| 256 |
+
// Handle command execution
|
| 257 |
+
function executeCommand() {
|
| 258 |
+
const command = commandInput.value.trim();
|
| 259 |
+
if (!command) return;
|
| 260 |
+
|
| 261 |
+
// Add to history
|
| 262 |
+
commandHistory.push(command);
|
| 263 |
+
historyIndex = commandHistory.length;
|
| 264 |
+
|
| 265 |
+
// Display command
|
| 266 |
+
addCommandToTerminal(command);
|
| 267 |
+
|
| 268 |
+
// Process command
|
| 269 |
+
processCommand(command);
|
| 270 |
+
|
| 271 |
+
// Clear input
|
| 272 |
+
commandInput.value = '';
|
| 273 |
+
}
|
| 274 |
+
|
| 275 |
+
// Handle Enter key
|
| 276 |
+
commandInput.addEventListener('keypress', (e) => {
|
| 277 |
+
if (e.key === 'Enter') {
|
| 278 |
+
executeCommand();
|
| 279 |
+
}
|
| 280 |
+
});
|
| 281 |
+
|
| 282 |
+
// Handle up/down arrows for history
|
| 283 |
+
commandInput.addEventListener('keydown', (e) => {
|
| 284 |
+
if (e.key === 'ArrowUp' && commandHistory.length > 0) {
|
| 285 |
+
e.preventDefault();
|
| 286 |
+
if (historyIndex > 0) historyIndex--;
|
| 287 |
+
commandInput.value = commandHistory[historyIndex] || '';
|
| 288 |
+
} else if (e.key === 'ArrowDown' && commandHistory.length > 0) {
|
| 289 |
+
e.preventDefault();
|
| 290 |
+
if (historyIndex < commandHistory.length - 1) historyIndex++;
|
| 291 |
+
commandInput.value = commandHistory[historyIndex] || '';
|
| 292 |
+
if (historyIndex === commandHistory.length - 1) {
|
| 293 |
+
commandInput.value = '';
|
| 294 |
+
historyIndex = commandHistory.length;
|
| 295 |
+
}
|
| 296 |
+
}
|
| 297 |
+
});
|
| 298 |
+
|
| 299 |
+
// Add command to terminal output
|
| 300 |
+
function addCommandToTerminal(command) {
|
| 301 |
+
const commandElement = document.createElement('div');
|
| 302 |
+
commandElement.className = 'text-green-400 mb-2';
|
| 303 |
+
commandElement.innerHTML = `
|
| 304 |
+
<div class="flex items-baseline">
|
| 305 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
| 306 |
+
<span class="text-gray-500 mx-1">@</span>
|
| 307 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
| 308 |
+
<span class="text-gray-500 mx-1">~</span>
|
| 309 |
+
<span class="text-gray-500">$</span>
|
| 310 |
+
<span class="ml-2">${command}</span>
|
| 311 |
+
</div>
|
| 312 |
+
`;
|
| 313 |
+
terminalOutput.appendChild(commandElement);
|
| 314 |
+
terminalOutput.scrollTop = terminalOutput.scrollHeight;
|
| 315 |
+
}
|
| 316 |
+
|
| 317 |
+
// Add output to terminal
|
| 318 |
+
function addOutputToTerminal(output, isError = false) {
|
| 319 |
+
const outputElement = document.createElement('div');
|
| 320 |
+
outputElement.className = isError ? 'text-red-400 mb-4 font-mono text-sm' : 'text-gray-300 mb-4 font-mono text-sm';
|
| 321 |
+
outputElement.innerHTML = output;
|
| 322 |
+
terminalOutput.appendChild(outputElement);
|
| 323 |
+
terminalOutput.scrollTop = terminalOutput.scrollHeight;
|
| 324 |
+
}
|
| 325 |
+
|
| 326 |
+
// Process commands
|
| 327 |
+
function processCommand(command) {
|
| 328 |
+
const cmd = command.split(' ')[0].toLowerCase();
|
| 329 |
+
const args = command.split(' ').slice(1);
|
| 330 |
+
|
| 331 |
+
switch(cmd) {
|
| 332 |
+
case 'help':
|
| 333 |
+
showHelp();
|
| 334 |
+
break;
|
| 335 |
+
case 'clear':
|
| 336 |
+
terminalOutput.innerHTML = '';
|
| 337 |
+
break;
|
| 338 |
+
case 'scan':
|
| 339 |
+
runScan(args);
|
| 340 |
+
break;
|
| 341 |
+
case 'exploit':
|
| 342 |
+
runExploit(args);
|
| 343 |
+
break;
|
| 344 |
+
case 'crack':
|
| 345 |
+
runCrack(args);
|
| 346 |
+
break;
|
| 347 |
+
case 'brute':
|
| 348 |
+
runBrute(args);
|
| 349 |
+
break;
|
| 350 |
+
case 'sniff':
|
| 351 |
+
runSniff(args);
|
| 352 |
+
break;
|
| 353 |
+
case 'spoof':
|
| 354 |
+
runSpoof(args);
|
| 355 |
+
break;
|
| 356 |
+
case 'dos':
|
| 357 |
+
runDos(args);
|
| 358 |
+
break;
|
| 359 |
+
case 'mitm':
|
| 360 |
+
runMitm(args);
|
| 361 |
+
break;
|
| 362 |
+
case 'enum':
|
| 363 |
+
runEnum(args);
|
| 364 |
+
break;
|
| 365 |
+
case 'list':
|
| 366 |
+
showPresetCommands();
|
| 367 |
+
break;
|
| 368 |
+
default:
|
| 369 |
+
addOutputToTerminal(`Command not found: ${cmd}. Type 'help' for available commands.`, true);
|
| 370 |
+
}
|
| 371 |
+
}
|
| 372 |
+
|
| 373 |
+
// Show help
|
| 374 |
+
function showHelp() {
|
| 375 |
+
const helpText = `
|
| 376 |
+
<div class="mb-2 text-blue-400">Available Commands:</div>
|
| 377 |
+
<div class="grid grid-cols-2 gap-2 mb-2">
|
| 378 |
+
<div><span class="text-green-400">help</span> - Show this help message</div>
|
| 379 |
+
<div><span class="text-green-400">clear</span> - Clear the terminal</div>
|
| 380 |
+
<div><span class="text-green-400">scan</span> [target] - Run network scan</div>
|
| 381 |
+
<div><span class="text-green-400">exploit</span> [target] - Run exploit</div>
|
| 382 |
+
<div><span class="text-green-400">crack</span> [hash] - Crack password hash</div>
|
| 383 |
+
<div><span class="text-green-400">brute</span> [service] - Brute force attack</div>
|
| 384 |
+
<div><span class="text-green-400">sniff</span> [interface] - Packet sniffing</div>
|
| 385 |
+
<div><span class="text-green-400">spoof</span> [target] - ARP spoofing</div>
|
| 386 |
+
<div><span class="text-green-400">dos</span> [target] - Denial of Service</div>
|
| 387 |
+
<div><span class="text-green-400">mitm</span> [target] - Man in the Middle</div>
|
| 388 |
+
<div><span class="text-green-400">enum</span> [service] - Service enumeration</div>
|
| 389 |
+
<div><span class="text-green-400">list</span> - Show preset commands</div>
|
| 390 |
+
</div>
|
| 391 |
+
<div class="text-gray-500 text-xs">Use preset commands from sidebar for specific tools</div>
|
| 392 |
+
`;
|
| 393 |
+
addOutputToTerminal(helpText);
|
| 394 |
+
}
|
| 395 |
+
|
| 396 |
+
// Show preset commands
|
| 397 |
+
function showPresetCommands() {
|
| 398 |
+
let commands = `
|
| 399 |
+
<div class="mb-2 text-blue-400">Preset Commands (click in sidebar):</div>
|
| 400 |
+
<div class="grid grid-cols-2 gap-1 text-xs">
|
| 401 |
+
`;
|
| 402 |
+
|
| 403 |
+
for (let i = 1; i <= 40; i++) {
|
| 404 |
+
const cmdName = getPresetCommandName(i);
|
| 405 |
+
commands += `<div>${i}. ${cmdName}</div>`;
|
| 406 |
+
}
|
| 407 |
+
|
| 408 |
+
commands += `</div>`;
|
| 409 |
+
addOutputToTerminal(commands);
|
| 410 |
+
}
|
| 411 |
+
|
| 412 |
+
// Run preset command
|
| 413 |
+
function runPresetCommand(num) {
|
| 414 |
+
const cmdName = getPresetCommandName(num);
|
| 415 |
+
const cmd = getPresetCommand(num);
|
| 416 |
+
|
| 417 |
+
// Simulate typing
|
| 418 |
+
commandInput.value = cmd;
|
| 419 |
+
|
| 420 |
+
// Execute after a short delay
|
| 421 |
+
setTimeout(() => {
|
| 422 |
+
executeCommand();
|
| 423 |
+
}, 100);
|
| 424 |
+
}
|
| 425 |
+
|
| 426 |
+
// Get preset command name
|
| 427 |
+
function getPresetCommandName(num) {
|
| 428 |
+
const commands = [
|
| 429 |
+
"Port Scan", "Ping Sweep", "DNS Enum", "WHOIS Lookup", "Subdomain Brute",
|
| 430 |
+
"HTTP Header", "SSL Check", "SQL Injection", "XSS Test", "CSRF Test",
|
| 431 |
+
"Brute Force", "Hash Crack", "Wifi Scan", "ARP Spoof", "MAC Changer",
|
| 432 |
+
"Packet Sniff", "MITM Attack", "DOS Attack", "SSH Brute", "FTP Brute",
|
| 433 |
+
"RDP Brute", "SMTP Enum", "SNMP Walk", "LDAP Enum", "SMB Enum",
|
| 434 |
+
"NFS Enum", "MySQL Brute", "MSSQL Brute", "Oracle Brute", "Postgres Brute",
|
| 435 |
+
"Redis Brute", "MongoDB Brute", "Elastic Brute", "Jenkins Brute", "Docker Enum",
|
| 436 |
+
"Kubernetes Enum", "AWS Enum", "Azure Enum", "GCP Enum", "Metasploit"
|
| 437 |
+
];
|
| 438 |
+
return commands[num - 1] || "Unknown Command";
|
| 439 |
+
}
|
| 440 |
+
|
| 441 |
+
// Get preset command
|
| 442 |
+
function getPresetCommand(num) {
|
| 443 |
+
const commands = [
|
| 444 |
+
"scan -p 1-1024", "scan -ping", "enum dns", "whois lookup", "scan -subdomains",
|
| 445 |
+
"scan -http", "scan -ssl", "exploit sql", "exploit xss", "exploit csrf",
|
| 446 |
+
"brute all", "crack md5", "scan -wifi", "spoof arp", "spoof mac",
|
| 447 |
+
"sniff eth0", "mitm start", "dos flood", "brute ssh", "brute ftp",
|
| 448 |
+
"brute rdp", "enum smtp", "enum snmp", "enum ldap", "enum smb",
|
| 449 |
+
"enum nfs", "brute mysql", "brute mssql", "brute oracle", "brute postgres",
|
| 450 |
+
"brute redis", "brute mongodb", "brute elastic", "brute jenkins", "enum docker",
|
| 451 |
+
"enum kubernetes", "enum aws", "enum azure", "enum gcp", "exploit msf"
|
| 452 |
+
];
|
| 453 |
+
return commands[num - 1] || "help";
|
| 454 |
+
}
|
| 455 |
+
|
| 456 |
+
// Command functions
|
| 457 |
+
function runScan(args) {
|
| 458 |
+
let output = "<div class='text-yellow-400'>Starting scan...</div>";
|
| 459 |
+
|
| 460 |
+
if (args.includes('-p')) {
|
| 461 |
+
output += `
|
| 462 |
+
<div class='ml-4'>
|
| 463 |
+
<div>Scanning ports 1-1024 on target...</div>
|
| 464 |
+
<div class='text-green-400'>β Port 22 (SSH) open</div>
|
| 465 |
+
<div class='text-green-400'>β Port 80 (HTTP) open</div>
|
| 466 |
+
<div class='text-green-400'>β Port 443 (HTTPS) open</div>
|
| 467 |
+
<div class='text-gray-500'>β Port 3389 (RDP) closed</div>
|
| 468 |
+
<div>Scan completed in 4.2 seconds</div>
|
| 469 |
+
</div>
|
| 470 |
+
`;
|
| 471 |
+
} else if (args.includes('-ping')) {
|
| 472 |
+
output += `
|
| 473 |
+
<div class='ml-4'>
|
| 474 |
+
<div>Pinging network range 192.168.1.1-254...</div>
|
| 475 |
+
<div class='text-green-400'>β 192.168.1.1 (Router) responding</div>
|
| 476 |
+
<div class='text-green-400'>β 192.168.1.105 (This machine)</div>
|
| 477 |
+
<div class='text-green-400'>β 192.168.1.120 (Unknown device)</div>
|
| 478 |
+
<div>5 hosts found in 8.7 seconds</div>
|
| 479 |
+
</div>
|
| 480 |
+
`;
|
| 481 |
+
} else if (args.includes('-wifi')) {
|
| 482 |
+
output += `
|
| 483 |
+
<div class='ml-4'>
|
| 484 |
+
<div>Scanning nearby WiFi networks...</div>
|
| 485 |
+
<div class='text-green-400'>β HomeWiFi (Signal: 85%, Security: WPA2)</div>
|
| 486 |
+
<div class='text-green-400'>β GuestNetwork (Signal: 60%, Security: Open)</div>
|
| 487 |
+
<div class='text-green-400'>β NeighborWiFi (Signal: 45%, Security: WPA3)</div>
|
| 488 |
+
<div>3 networks found</div>
|
| 489 |
+
</div>
|
| 490 |
+
`;
|
| 491 |
+
} else if (args.includes('-subdomains')) {
|
| 492 |
+
output += `
|
| 493 |
+
<div class='ml-4'>
|
| 494 |
+
<div>Brute-forcing subdomains for example.com...</div>
|
| 495 |
+
<div class='text-green-400'>β Found: www.example.com</div>
|
| 496 |
+
<div class='text-green-400'>β Found: mail.example.com</div>
|
| 497 |
+
<div class='text-green-400'>β Found: api.example.com</div>
|
| 498 |
+
<div class='text-green-400'>β Found: dev.example.com</div>
|
| 499 |
+
<div>4 subdomains discovered</div>
|
| 500 |
+
</div>
|
| 501 |
+
`;
|
| 502 |
+
} else if (args.includes('-http')) {
|
| 503 |
+
output += `
|
| 504 |
+
<div class='ml-4'>
|
| 505 |
+
<div>Fetching HTTP headers for target...</div>
|
| 506 |
+
<div>Server: Apache/2.4.41</div>
|
| 507 |
+
<div>X-Powered-By: PHP/7.4.3</div>
|
| 508 |
+
<div>Content-Type: text/html; charset=UTF-8</div>
|
| 509 |
+
<div>X-Frame-Options: SAMEORIGIN</div>
|
| 510 |
+
</div>
|
| 511 |
+
`;
|
| 512 |
+
} else if (args.includes('-ssl')) {
|
| 513 |
+
output += `
|
| 514 |
+
<div class='ml-4'>
|
| 515 |
+
<div>Checking SSL certificate...</div>
|
| 516 |
+
<div>Issuer: Let's Encrypt</div>
|
| 517 |
+
<div>Valid until: 2023-12-31</div>
|
| 518 |
+
<div>Signature Algorithm: SHA256-RSA</div>
|
| 519 |
+
<div class='text-yellow-400'>Warning: TLS 1.0 enabled</div>
|
| 520 |
+
</div>
|
| 521 |
+
`;
|
| 522 |
+
} else {
|
| 523 |
+
output = "<div class='text-red-400'>Invalid scan type. Use 'scan -p' for port scan, 'scan -ping' for ping sweep, etc.</div>";
|
| 524 |
+
}
|
| 525 |
+
|
| 526 |
+
addOutputToTerminal(output);
|
| 527 |
+
}
|
| 528 |
+
|
| 529 |
+
function runExploit(args) {
|
| 530 |
+
let output = "<div class='text-yellow-400'>Preparing exploit...</div>";
|
| 531 |
+
|
| 532 |
+
if (args.includes('sql')) {
|
| 533 |
+
output += `
|
| 534 |
+
<div class='ml-4'>
|
| 535 |
+
<div>Testing for SQL injection vulnerabilities...</div>
|
| 536 |
+
<div class='text-green-400'>β Vulnerable parameter found: 'id'</div>
|
| 537 |
+
<div>Attempting UNION-based injection...</div>
|
| 538 |
+
<div class='text-green-400'>β Success! Database version: MySQL 5.7.32</div>
|
| 539 |
+
<div>Dumping database names:</div>
|
| 540 |
+
<div class='ml-4'>- information_schema</div>
|
| 541 |
+
<div class='ml-4'>- website_db</div>
|
| 542 |
+
<div class='ml-4'>- users_db</div>
|
| 543 |
+
</div>
|
| 544 |
+
`;
|
| 545 |
+
} else if (args.includes('xss')) {
|
| 546 |
+
output += `
|
| 547 |
+
<div class='ml-4'>
|
| 548 |
+
<div>Testing for XSS vulnerabilities...</div>
|
| 549 |
+
<div class='text-green-400'>β Reflected XSS found in search parameter</div>
|
| 550 |
+
<div class='text-green-400'>β Stored XSS found in comment form</div>
|
| 551 |
+
<div>Example payload: <script>alert(1)</script></div>
|
| 552 |
+
</div>
|
| 553 |
+
`;
|
| 554 |
+
} else if (args.includes('csrf')) {
|
| 555 |
+
output += `
|
| 556 |
+
<div class='ml-4'>
|
| 557 |
+
<div>Testing for CSRF vulnerabilities...</div>
|
| 558 |
+
<div class='text-green-400'>β No CSRF token found in password change form</div>
|
| 559 |
+
<div>Vulnerable to CSRF attacks</div>
|
| 560 |
+
</div>
|
| 561 |
+
`;
|
| 562 |
+
} else if (args.includes('msf')) {
|
| 563 |
+
output += `
|
| 564 |
+
<div class='ml-4'>
|
| 565 |
+
<div>Starting Metasploit framework...</div>
|
| 566 |
+
<div>msf6 > use exploit/multi/handler</div>
|
| 567 |
+
<div>msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp</div>
|
| 568 |
+
<div>msf6 exploit(multi/handler) > set LHOST 192.168.1.105</div>
|
| 569 |
+
<div>msf6 exploit(multi/handler) > set LPORT 4444</div>
|
| 570 |
+
<div>msf6 exploit(multi/handler) > exploit</div>
|
| 571 |
+
<div class='text-green-400'>[*] Started reverse TCP handler on 192.168.1.105:4444</div>
|
| 572 |
+
</div>
|
| 573 |
+
`;
|
| 574 |
+
} else {
|
| 575 |
+
output = "<div class='text-red-400'>Invalid exploit type. Use 'exploit sql', 'exploit xss', etc.</div>";
|
| 576 |
+
}
|
| 577 |
+
|
| 578 |
+
addOutputToTerminal(output);
|
| 579 |
+
}
|
| 580 |
+
|
| 581 |
+
function runCrack(args) {
|
| 582 |
+
let output = "<div class='text-yellow-400'>Starting hash cracking...</div>";
|
| 583 |
+
|
| 584 |
+
if (args.includes('md5')) {
|
| 585 |
+
output += `
|
| 586 |
+
<div class='ml-4'>
|
| 587 |
+
<div>Hash: 5f4dcc3b5aa765d61d8327deb882cf99</div>
|
| 588 |
+
<div>Using rockyou.txt wordlist...</div>
|
| 589 |
+
<div class='text-green-400'>β Cracked: password (0.4 seconds)</div>
|
| 590 |
+
</div>
|
| 591 |
+
`;
|
| 592 |
+
} else {
|
| 593 |
+
output = "<div class='text-red-400'>Invalid hash type. Use 'crack md5' for MD5 hashes.</div>";
|
| 594 |
+
}
|
| 595 |
+
|
| 596 |
+
addOutputToTerminal(output);
|
| 597 |
+
}
|
| 598 |
+
|
| 599 |
+
function runBrute(args) {
|
| 600 |
+
let output = "<div class='text-yellow-400'>Preparing brute force attack...</div>";
|
| 601 |
+
|
| 602 |
+
if (args.includes('ssh')) {
|
| 603 |
+
output += `
|
| 604 |
+
<div class='ml-4'>
|
| 605 |
+
<div>Target: SSH (192.168.1.120:22)</div>
|
| 606 |
+
<div>Username list: top-usernames.txt</div>
|
| 607 |
+
<div>Password list: rockyou.txt</div>
|
| 608 |
+
<div>Starting attack...</div>
|
| 609 |
+
<div class='text-green-400'>β Found credentials: admin:admin123</div>
|
| 610 |
+
<div>Time elapsed: 12 minutes</div>
|
| 611 |
+
</div>
|
| 612 |
+
`;
|
| 613 |
+
} else if (args.includes('ftp')) {
|
| 614 |
+
output += `
|
| 615 |
+
<div class='ml-4'>
|
| 616 |
+
<div>Target: FTP (192.168.1.120:21)</div>
|
| 617 |
+
<div>Username list: common-ftp-users.txt</div>
|
| 618 |
+
<div>Password list: rockyou.txt</div>
|
| 619 |
+
<div>Starting attack...</div>
|
| 620 |
+
<div class='text-green-400'>β Found credentials: ftpuser:ftp123</div>
|
| 621 |
+
<div>Time elapsed: 8 minutes</div>
|
| 622 |
+
</div>
|
| 623 |
+
`;
|
| 624 |
+
} else if (args.includes('all')) {
|
| 625 |
+
output += `
|
| 626 |
+
<div class='ml-4'>
|
| 627 |
+
<div>Running multi-service brute force...</div>
|
| 628 |
+
<div class='text-green-400'>β SSH: admin:admin123</div>
|
| 629 |
+
<div class='text-green-400'>β FTP: ftpuser:ftp123</div>
|
| 630 |
+
<div class='text-red-400'>β RDP: No valid credentials</div>
|
| 631 |
+
<div>Completed in 25 minutes</div>
|
| 632 |
+
</div>
|
| 633 |
+
`;
|
| 634 |
+
} else {
|
| 635 |
+
output = "<div class='text-red-400'>Invalid service. Use 'brute ssh', 'brute ftp', etc.</div>";
|
| 636 |
+
}
|
| 637 |
+
|
| 638 |
+
addOutputToTerminal(output);
|
| 639 |
+
}
|
| 640 |
+
|
| 641 |
+
function runSniff(args) {
|
| 642 |
+
let output = "<div class='text-yellow-400'>Starting packet sniffing...</div>";
|
| 643 |
+
|
| 644 |
+
if (args.includes('eth0') || args.includes('start')) {
|
| 645 |
+
output += `
|
| 646 |
+
<div class='ml-4'>
|
| 647 |
+
<div>Interface: eth0</div>
|
| 648 |
+
<div>Filter: tcp port 80</div>
|
| 649 |
+
<div>Capturing packets (Ctrl+C to stop)...</div>
|
| 650 |
+
<div class='text-xs font-mono mt-2'>
|
| 651 |
+
<div>192.168.1.105:52341 -> 142.250.190.46:80 [GET / HTTP/1.1]</div>
|
| 652 |
+
<div>192.168.1.105:52342 -> 151.101.1.69:80 [GET /static/logo.png HTTP/1.1]</div>
|
| 653 |
+
<div>192.168.1.120:52343 -> 192.168.1.105:80 [POST /login HTTP/1.1]</div>
|
| 654 |
+
<div>... capturing more packets ...</div>
|
| 655 |
+
</div>
|
| 656 |
+
</div>
|
| 657 |
+
`;
|
| 658 |
+
} else {
|
| 659 |
+
output = "<div class='text-red-400'>Invalid interface. Use 'sniff eth0'.</div>";
|
| 660 |
+
}
|
| 661 |
+
|
| 662 |
+
addOutputToTerminal(output);
|
| 663 |
+
}
|
| 664 |
+
|
| 665 |
+
function runSpoof(args) {
|
| 666 |
+
let output = "<div class='text-yellow-400'>Preparing spoofing attack...</div>";
|
| 667 |
+
|
| 668 |
+
if (args.includes('arp')) {
|
| 669 |
+
output += `
|
| 670 |
+
<div class='ml-4'>
|
| 671 |
+
<div>Target: 192.168.1.120</div>
|
| 672 |
+
<div>Gateway: 192.168.1.1</div>
|
| 673 |
+
<div>Starting ARP spoofing...</div>
|
| 674 |
+
<div class='text-green-400'>β Poisoning ARP tables</div>
|
| 675 |
+
<div>Redirecting traffic through this machine</div>
|
| 676 |
+
<div class='text-yellow-400'>Warning: This will disrupt network connectivity</div>
|
| 677 |
+
</div>
|
| 678 |
+
`;
|
| 679 |
+
} else if (args.includes('mac')) {
|
| 680 |
+
output += `
|
| 681 |
+
<div class='ml-4'>
|
| 682 |
+
<div>Interface: eth0</div>
|
| 683 |
+
<div>Current MAC: 00:1A:2B:3C:4D:5E</div>
|
| 684 |
+
<div>Changing to random MAC address...</div>
|
| 685 |
+
<div class='text-green-400'>β New MAC: 12:34:56:78:90:AB</div>
|
| 686 |
+
</div>
|
| 687 |
+
`;
|
| 688 |
+
} else {
|
| 689 |
+
output = "<div class='text-red-400'>Invalid spoof type. Use 'spoof arp' or 'spoof mac'.</div>";
|
| 690 |
+
}
|
| 691 |
+
|
| 692 |
+
addOutputToTerminal(output);
|
| 693 |
+
}
|
| 694 |
+
|
| 695 |
+
function runDos(args) {
|
| 696 |
+
let output = "<div class='text-yellow-400'>Preparing DoS attack...</div>";
|
| 697 |
+
|
| 698 |
+
if (args.includes('flood')) {
|
| 699 |
+
output += `
|
| 700 |
+
<div class='ml-4'>
|
| 701 |
+
<div>Target: 192.168.1.120:80</div>
|
| 702 |
+
<div>Attack type: SYN Flood</div>
|
| 703 |
+
<div>Starting attack with 1000 packets/second...</div>
|
| 704 |
+
<div class='text-green-400'>β Target response slowing down</div>
|
| 705 |
+
<div class='text-green-400'>β Target service unavailable</div>
|
| 706 |
+
<div class='text-yellow-400'>Warning: This is illegal without permission</div>
|
| 707 |
+
</div>
|
| 708 |
+
`;
|
| 709 |
+
} else {
|
| 710 |
+
output = "<div class='text-red-400'>Invalid DoS type. Use 'dos flood'.</div>";
|
| 711 |
+
}
|
| 712 |
+
|
| 713 |
+
addOutputToTerminal(output);
|
| 714 |
+
}
|
| 715 |
+
|
| 716 |
+
function runMitm(args) {
|
| 717 |
+
let output = "<div class='text-yellow-400'>Preparing MITM attack...</div>";
|
| 718 |
+
|
| 719 |
+
if (args.includes('start')) {
|
| 720 |
+
output += `
|
| 721 |
+
<div class='ml-4'>
|
| 722 |
+
<div>Target: 192.168.1.120</div>
|
| 723 |
+
<div>Gateway: 192.168.1.1</div>
|
| 724 |
+
<div>Starting ARP poisoning...</div>
|
| 725 |
+
<div class='text-green-400'>β Traffic redirected</div>
|
| 726 |
+
<div>Starting SSLstrip...</div>
|
| 727 |
+
<div class='text-green-400'>β Capturing plaintext credentials</div>
|
| 728 |
+
<div>Starting packet inspection...</div>
|
| 729 |
+
<div class='text-xs font-mono mt-2'>
|
| 730 |
+
<div>[HTTP] username: johndoe, password: s3cr3t</div>
|
| 731 |
+
<div>[COOKIE] sessionid: a1b2c3d4e5f6</div>
|
| 732 |
+
<div>... capturing more data ...</div>
|
| 733 |
+
</div>
|
| 734 |
+
</div>
|
| 735 |
+
`;
|
| 736 |
+
} else {
|
| 737 |
+
output = "<div class='text-red-400'>Invalid command. Use 'mitm start'.</div>";
|
| 738 |
+
}
|
| 739 |
+
|
| 740 |
+
addOutputToTerminal(output);
|
| 741 |
+
}
|
| 742 |
+
|
| 743 |
+
function runEnum(args) {
|
| 744 |
+
let output = "<div class='text-yellow-400'>Starting enumeration...</div>";
|
| 745 |
+
|
| 746 |
+
if (args.includes('dns')) {
|
| 747 |
+
output += `
|
| 748 |
+
<div class='ml-4'>
|
| 749 |
+
<div>Target: example.com</div>
|
| 750 |
+
<div>Performing DNS enumeration...</div>
|
| 751 |
+
<div class='text-green-400'>β A record: 93.184.216.34</div>
|
| 752 |
+
<div class='text-green-400'>β MX records: mail.example.com</div>
|
| 753 |
+
<div class='text-green-400'>β TXT records: "v=spf1 include:_spf.example.com ~all"</div>
|
| 754 |
+
<div>DNS enumeration complete</div>
|
| 755 |
+
</div>
|
| 756 |
+
`;
|
| 757 |
+
} else if (args.includes('smtp')) {
|
| 758 |
+
output += `
|
| 759 |
+
<div class='ml-4'>
|
| 760 |
+
<div>Target: mail.example.com:25</div>
|
| 761 |
+
<div>Enumerating SMTP users...</div>
|
| 762 |
+
<div class='text-green-400'>β Valid user: admin@example.com</div>
|
| 763 |
+
<div class='text-green-400'>β Valid user: support@example.com</div>
|
| 764 |
+
<div class='text-red-400'>β Invalid user: root@example.com</div>
|
| 765 |
+
<div>Found 2 valid email addresses</div>
|
| 766 |
+
</div>
|
| 767 |
+
`;
|
| 768 |
+
} else if (args.includes('snmp')) {
|
| 769 |
+
output += `
|
| 770 |
+
<div class='ml-4'>
|
| 771 |
+
<div>Target: 192.168.1.120</div>
|
| 772 |
+
<div>Community string: public</div>
|
| 773 |
+
<div>Walking SNMP tree...</div>
|
| 774 |
+
<div class='text-green-400'>β System: Cisco Router</div>
|
| 775 |
+
<div class='text-green-400'>β Uptime: 14 days, 6 hours</div>
|
| 776 |
+
<div class='text-green-400'>β Interfaces: 4</div>
|
| 777 |
+
<div>SNMP enumeration complete</div>
|
| 778 |
+
</div>
|
| 779 |
+
`;
|
| 780 |
+
} else {
|
| 781 |
+
output = "<div class='text-red-400'>Invalid service. Use 'enum dns', 'enum smtp', etc.</div>";
|
| 782 |
+
}
|
| 783 |
+
|
| 784 |
+
addOutputToTerminal(output);
|
| 785 |
+
}
|
| 786 |
+
</script>
|
| 787 |
+
<p style="border-radius: 8px; text-align: center; font-size: 12px; color: #fff; margin-top: 16px;position: fixed; left: 8px; bottom: 8px; z-index: 10; background: rgba(0, 0, 0, 0.8); padding: 4px 8px;">Made with <img src="https://enzostvs-deepsite.hf.space/logo.svg" alt="DeepSite Logo" style="width: 16px; height: 16px; vertical-align: middle;display:inline-block;margin-right:3px;filter:brightness(0) invert(1);"><a href="https://enzostvs-deepsite.hf.space" style="color: #fff;text-decoration: underline;" target="_blank" >DeepSite</a> - 𧬠<a href="https://enzostvs-deepsite.hf.space?remix=ash-coded-it/hacktool" style="color: #fff;text-decoration: underline;" target="_blank" >Remix</a></p></body>
|
| 788 |
+
</html>
|
prompts.txt
ADDED
|
File without changes
|