forked from IRNCyber/tactages
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathtz.py
More file actions
81 lines (70 loc) · 4.34 KB
/
tz.py
File metadata and controls
81 lines (70 loc) · 4.34 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
import subprocess
import sys
from colorama import Fore, init, Style
init(autoreset=True)
init(autoreset=True)
def print_banner():
banner = f"""
{Fore.RED}████████╗ █████╗ ██████╗████████╗ █████╗ ██████╗ ███████╗███████╗
{Fore.RED}╚══██╔══╝██╔══██╗██╔════╝╚══██╔══╝██╔══██╗██╔════╝ ██╔════╝██╔════╝
{Fore.RED} ██║ ███████║██║ ██║ ███████║██║ ███╗█████╗ ███████╗
{Fore.RED} ██║ ██╔══██║██║ ██║ ██╔══██║██║ ██║██╔══╝ ╚════██║
{Fore.RED} ██║ ██║ ██║╚██████╗ ██║ ██║ ██║╚██████╔╝███████╗███████║
{Fore.RED} ╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝╚══════╝
{Fore.CYAN}━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
{Fore.YELLOW} 🚀 TACTAGES - The Ultimate Pentesting Interface 🚀
{Fore.CYAN}━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
{Fore.GREEN} 🔹 A Multi-Tool Interface for Ethical Hacking & Cybersecurity 🔹 @TacticalZero
{Fore.GREEN} 🔹 Tools: {Fore.RED}Nmap{Fore.GREEN}, {Fore.RED}Metasploit{Fore.GREEN}, {Fore.RED}Wireshark{Fore.GREEN}, {Fore.RED}Hydra{Fore.GREEN}, {Fore.RED}John the Ripper{Fore.GREEN}, etc. 🔹
{Fore.CYAN}━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
{Style.RESET_ALL}
"""
print(banner)
def run_nmap():
target = input(f"{Fore.YELLOW}[?] Enter the target IP or hostname: ")
command = f"nmap -sV -sC -oA nmap_scan {target}"
print(f"{Fore.BLUE}[*] Running Nmap scan on {target}...")
subprocess.run(command, shell=True)
print(f"{Fore.GREEN}[+] Nmap scan completed!")
def run_metasploit():
print(f"{Fore.BLUE}[*] Launching Metasploit Framework...")
subprocess.run("msfconsole", shell=True)
print(f"{Fore.GREEN}[+] Metasploit session ended.")
def run_wireshark():
print(f"{Fore.BLUE}[*] Launching Wireshark...")
subprocess.run("wireshark", shell=True)
print(f"{Fore.GREEN}[+] Wireshark closed.")
def run_hydra():
target = input(f"{Fore.YELLOW}[?] Enter the target IP: ")
service = input(f"{Fore.YELLOW}[?] Enter the service to attack (e.g., ssh, ftp): ")
userlist = input(f"{Fore.YELLOW}[?] Enter the path to the username list: ")
passlist = input(f"{Fore.YELLOW}[?] Enter the path to the password list: ")
command = f"hydra -L {userlist} -P {passlist} {target} {service}"
print(f"{Fore.BLUE}[*] Running Hydra on {target}...")
subprocess.run(command, shell=True)
print(f"{Fore.GREEN}[+] Hydra attack completed!")
def main_menu():
print_banner()
while True:
print(f"\n{Fore.CYAN}Main Menu:")
print(f"{Fore.YELLOW}1. Run Nmap Scan")
print(f"{Fore.YELLOW}2. Launch Metasploit Framework")
print(f"{Fore.YELLOW}3. Launch Wireshark")
print(f"{Fore.YELLOW}4. Run Hydra Attack")
print(f"{Fore.YELLOW}5. Exit")
choice = input(f"{Fore.YELLOW}[?] Select an option: ")
if choice == "1":
run_nmap()
elif choice == "2":
run_metasploit()
elif choice == "3":
run_wireshark()
elif choice == "4":
run_hydra()
elif choice == "5":
print(f"{Fore.RED}[*] Exiting TACTAGES. Goodbye!")
sys.exit()
else:
print(f"{Fore.RED}[!] Invalid option. Please try again.")
if __name__ == "__main__":
main_menu()