Spaces:
Running
Running
Add 3 files
Browse files- README.md +6 -4
- index.html +788 -19
- prompts.txt +0 -0
README.md
CHANGED
@@ -1,10 +1,12 @@
|
|
1 |
---
|
2 |
-
title:
|
3 |
-
emoji:
|
4 |
colorFrom: blue
|
5 |
-
colorTo:
|
6 |
sdk: static
|
7 |
pinned: false
|
|
|
|
|
8 |
---
|
9 |
|
10 |
-
Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
|
|
|
1 |
---
|
2 |
+
title: hacktool
|
3 |
+
emoji: π³
|
4 |
colorFrom: blue
|
5 |
+
colorTo: red
|
6 |
sdk: static
|
7 |
pinned: false
|
8 |
+
tags:
|
9 |
+
- deepsite
|
10 |
---
|
11 |
|
12 |
+
Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
|
index.html
CHANGED
@@ -1,19 +1,788 @@
|
|
1 |
-
<!
|
2 |
-
<html>
|
3 |
-
|
4 |
-
|
5 |
-
|
6 |
-
|
7 |
-
|
8 |
-
|
9 |
-
|
10 |
-
|
11 |
-
|
12 |
-
|
13 |
-
|
14 |
-
|
15 |
-
|
16 |
-
|
17 |
-
|
18 |
-
|
19 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
<!DOCTYPE html>
|
2 |
+
<html lang="en">
|
3 |
+
<head>
|
4 |
+
<meta charset="UTF-8">
|
5 |
+
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
6 |
+
<title>HackTool Pro - macOS</title>
|
7 |
+
<script src="https://cdn.tailwindcss.com"></script>
|
8 |
+
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.4.0/css/all.min.css">
|
9 |
+
<style>
|
10 |
+
@keyframes blink {
|
11 |
+
0%, 100% { opacity: 1; }
|
12 |
+
50% { opacity: 0; }
|
13 |
+
}
|
14 |
+
.cursor-blink {
|
15 |
+
animation: blink 1s step-end infinite;
|
16 |
+
}
|
17 |
+
.window {
|
18 |
+
box-shadow: 0 10px 30px rgba(0, 0, 0, 0.2);
|
19 |
+
border-radius: 8px;
|
20 |
+
overflow: hidden;
|
21 |
+
}
|
22 |
+
.terminal-bg {
|
23 |
+
background-color: #1a1a1a;
|
24 |
+
}
|
25 |
+
.scrollbar-hide::-webkit-scrollbar {
|
26 |
+
display: none;
|
27 |
+
}
|
28 |
+
.command-history {
|
29 |
+
height: calc(100% - 40px);
|
30 |
+
}
|
31 |
+
.macos-traffic-light {
|
32 |
+
width: 12px;
|
33 |
+
height: 12px;
|
34 |
+
border-radius: 50%;
|
35 |
+
margin-right: 8px;
|
36 |
+
}
|
37 |
+
.sidebar-item:hover {
|
38 |
+
background-color: rgba(255, 255, 255, 0.1);
|
39 |
+
}
|
40 |
+
.sidebar-item.active {
|
41 |
+
background-color: rgba(0, 122, 255, 0.2);
|
42 |
+
border-left: 3px solid #007aff;
|
43 |
+
}
|
44 |
+
.typewriter {
|
45 |
+
overflow: hidden;
|
46 |
+
white-space: nowrap;
|
47 |
+
margin: 0 auto;
|
48 |
+
letter-spacing: 0.15em;
|
49 |
+
}
|
50 |
+
</style>
|
51 |
+
</head>
|
52 |
+
<body class="bg-gray-900 text-white h-screen overflow-hidden flex items-center justify-center p-4">
|
53 |
+
<div class="window w-full max-w-6xl h-[90vh] flex flex-col">
|
54 |
+
<!-- Title Bar -->
|
55 |
+
<div class="bg-gray-800 rounded-t-lg flex items-center px-4 py-2">
|
56 |
+
<div class="flex mr-4">
|
57 |
+
<div class="macos-traffic-light bg-red-500"></div>
|
58 |
+
<div class="macos-traffic-light bg-yellow-500"></div>
|
59 |
+
<div class="macos-traffic-light bg-green-500"></div>
|
60 |
+
</div>
|
61 |
+
<div class="text-sm font-medium text-gray-300 flex-1 text-center">
|
62 |
+
HackTool Pro - Terminal
|
63 |
+
</div>
|
64 |
+
<div class="text-xs text-gray-500">
|
65 |
+
v2.4.1
|
66 |
+
</div>
|
67 |
+
</div>
|
68 |
+
|
69 |
+
<!-- Main Content -->
|
70 |
+
<div class="flex flex-1 overflow-hidden">
|
71 |
+
<!-- Sidebar -->
|
72 |
+
<div class="w-64 bg-gray-800 p-4 flex flex-col">
|
73 |
+
<div class="mb-6">
|
74 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Quick Actions</div>
|
75 |
+
<button class="bg-blue-600 hover:bg-blue-700 text-white px-3 py-1 rounded text-sm w-full mb-2 flex items-center">
|
76 |
+
<i class="fas fa-bolt mr-2"></i> Quick Scan
|
77 |
+
</button>
|
78 |
+
<button class="bg-green-600 hover:bg-green-700 text-white px-3 py-1 rounded text-sm w-full flex items-center">
|
79 |
+
<i class="fas fa-shield-alt mr-2"></i> Defense Mode
|
80 |
+
</button>
|
81 |
+
</div>
|
82 |
+
|
83 |
+
<div class="mb-6">
|
84 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Hacking Tools</div>
|
85 |
+
<div class="space-y-1">
|
86 |
+
<div class="sidebar-item active px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
87 |
+
<i class="fas fa-terminal mr-2 text-blue-400"></i> Terminal
|
88 |
+
</div>
|
89 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
90 |
+
<i class="fas fa-network-wired mr-2 text-purple-400"></i> Network Scanner
|
91 |
+
</div>
|
92 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
93 |
+
<i class="fas fa-lock mr-2 text-yellow-400"></i> Password Cracker
|
94 |
+
</div>
|
95 |
+
<div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
|
96 |
+
<i class="fas fa-code mr-2 text-red-400"></i> Exploit Database
|
97 |
+
</div>
|
98 |
+
</div>
|
99 |
+
</div>
|
100 |
+
|
101 |
+
<div class="mb-6 flex-1">
|
102 |
+
<div class="text-xs uppercase text-gray-500 mb-2">Preset Commands</div>
|
103 |
+
<div class="bg-gray-700 rounded p-2 h-64 overflow-y-auto scrollbar-hide">
|
104 |
+
<div class="grid grid-cols-2 gap-2">
|
105 |
+
<button onclick="runPresetCommand(1)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">1. Port Scan</button>
|
106 |
+
<button onclick="runPresetCommand(2)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">2. Ping Sweep</button>
|
107 |
+
<button onclick="runPresetCommand(3)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">3. DNS Enum</button>
|
108 |
+
<button onclick="runPresetCommand(4)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">4. WHOIS Lookup</button>
|
109 |
+
<button onclick="runPresetCommand(5)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">5. Subdomain Brute</button>
|
110 |
+
<button onclick="runPresetCommand(6)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">6. HTTP Header</button>
|
111 |
+
<button onclick="runPresetCommand(7)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">7. SSL Check</button>
|
112 |
+
<button onclick="runPresetCommand(8)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">8. SQL Injection</button>
|
113 |
+
<button onclick="runPresetCommand(9)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">9. XSS Test</button>
|
114 |
+
<button onclick="runPresetCommand(10)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">10. CSRF Test</button>
|
115 |
+
<button onclick="runPresetCommand(11)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">11. Brute Force</button>
|
116 |
+
<button onclick="runPresetCommand(12)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">12. Hash Crack</button>
|
117 |
+
<button onclick="runPresetCommand(13)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">13. Wifi Scan</button>
|
118 |
+
<button onclick="runPresetCommand(14)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">14. ARP Spoof</button>
|
119 |
+
<button onclick="runPresetCommand(15)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">15. MAC Changer</button>
|
120 |
+
<button onclick="runPresetCommand(16)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">16. Packet Sniff</button>
|
121 |
+
<button onclick="runPresetCommand(17)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">17. MITM Attack</button>
|
122 |
+
<button onclick="runPresetCommand(18)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">18. DOS Attack</button>
|
123 |
+
<button onclick="runPresetCommand(19)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">19. SSH Brute</button>
|
124 |
+
<button onclick="runPresetCommand(20)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">20. FTP Brute</button>
|
125 |
+
<button onclick="runPresetCommand(21)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">21. RDP Brute</button>
|
126 |
+
<button onclick="runPresetCommand(22)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">22. SMTP Enum</button>
|
127 |
+
<button onclick="runPresetCommand(23)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">23. SNMP Walk</button>
|
128 |
+
<button onclick="runPresetCommand(24)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">24. LDAP Enum</button>
|
129 |
+
<button onclick="runPresetCommand(25)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">25. SMB Enum</button>
|
130 |
+
<button onclick="runPresetCommand(26)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">26. NFS Enum</button>
|
131 |
+
<button onclick="runPresetCommand(27)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">27. MySQL Brute</button>
|
132 |
+
<button onclick="runPresetCommand(28)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">28. MSSQL Brute</button>
|
133 |
+
<button onclick="runPresetCommand(29)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">29. Oracle Brute</button>
|
134 |
+
<button onclick="runPresetCommand(30)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">30. Postgres Brute</button>
|
135 |
+
<button onclick="runPresetCommand(31)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">31. Redis Brute</button>
|
136 |
+
<button onclick="runPresetCommand(32)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">32. MongoDB Brute</button>
|
137 |
+
<button onclick="runPresetCommand(33)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">33. Elastic Brute</button>
|
138 |
+
<button onclick="runPresetCommand(34)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">34. Jenkins Brute</button>
|
139 |
+
<button onclick="runPresetCommand(35)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">35. Docker Enum</button>
|
140 |
+
<button onclick="runPresetCommand(36)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">36. Kubernetes Enum</button>
|
141 |
+
<button onclick="runPresetCommand(37)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">37. AWS Enum</button>
|
142 |
+
<button onclick="runPresetCommand(38)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">38. Azure Enum</button>
|
143 |
+
<button onclick="runPresetCommand(39)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">39. GCP Enum</button>
|
144 |
+
<button onclick="runPresetCommand(40)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">40. Metasploit</button>
|
145 |
+
</div>
|
146 |
+
</div>
|
147 |
+
</div>
|
148 |
+
|
149 |
+
<div class="text-xs text-gray-500 text-center">
|
150 |
+
Connected: <span class="text-green-400">localhost</span>
|
151 |
+
</div>
|
152 |
+
</div>
|
153 |
+
|
154 |
+
<!-- Terminal -->
|
155 |
+
<div class="flex-1 flex flex-col terminal-bg">
|
156 |
+
<div class="p-4 border-b border-gray-700 flex items-center">
|
157 |
+
<div class="flex-1">
|
158 |
+
<div class="text-sm font-medium">Terminal Session</div>
|
159 |
+
<div class="text-xs text-gray-500">Interactive hacking console</div>
|
160 |
+
</div>
|
161 |
+
<div class="flex space-x-2">
|
162 |
+
<button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
|
163 |
+
<i class="fas fa-cog text-gray-400 text-sm"></i>
|
164 |
+
</button>
|
165 |
+
<button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
|
166 |
+
<i class="fas fa-expand text-gray-400 text-sm"></i>
|
167 |
+
</button>
|
168 |
+
</div>
|
169 |
+
</div>
|
170 |
+
|
171 |
+
<div class="flex-1 p-4 overflow-y-auto scrollbar-hide command-history" id="terminal-output">
|
172 |
+
<div class="text-green-400 mb-4">
|
173 |
+
<div class="flex items-baseline">
|
174 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
175 |
+
<span class="text-gray-500 mx-1">@</span>
|
176 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
177 |
+
<span class="text-gray-500 mx-1">~</span>
|
178 |
+
<span class="text-gray-500">$</span>
|
179 |
+
<span class="ml-2 typewriter" style="width: 350px;">Welcome to HackTool Pro v2.4.1 - Ethical Hacking Terminal</span>
|
180 |
+
</div>
|
181 |
+
</div>
|
182 |
+
<div class="text-gray-400 text-sm mb-4">
|
183 |
+
Type <span class="text-blue-400">help</span> to see available commands or click on preset commands from the sidebar.
|
184 |
+
</div>
|
185 |
+
<div class="text-gray-400 text-sm mb-4">
|
186 |
+
<div class="flex items-baseline">
|
187 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
188 |
+
<span class="text-gray-500 mx-1">@</span>
|
189 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
190 |
+
<span class="text-gray-500 mx-1">~</span>
|
191 |
+
<span class="text-gray-500">$</span>
|
192 |
+
<span class="ml-2">Initializing system...</span>
|
193 |
+
</div>
|
194 |
+
<div class="ml-8 text-green-400">β Security protocols enabled</div>
|
195 |
+
<div class="ml-8 text-green-400">β Command modules loaded</div>
|
196 |
+
<div class="ml-8 text-green-400">β Network interfaces ready</div>
|
197 |
+
</div>
|
198 |
+
</div>
|
199 |
+
|
200 |
+
<div class="p-4 border-t border-gray-700">
|
201 |
+
<div class="flex items-center">
|
202 |
+
<span class="text-green-400 font-mono mr-2">$</span>
|
203 |
+
<input type="text" id="command-input" class="bg-transparent border-none outline-none flex-1 font-mono text-green-400" placeholder="Enter command..." autofocus>
|
204 |
+
<button class="ml-2 bg-blue-600 hover:bg-blue-700 px-3 py-1 rounded text-sm" onclick="executeCommand()">
|
205 |
+
Run
|
206 |
+
</button>
|
207 |
+
</div>
|
208 |
+
</div>
|
209 |
+
</div>
|
210 |
+
</div>
|
211 |
+
|
212 |
+
<!-- Status Bar -->
|
213 |
+
<div class="bg-gray-800 rounded-b-lg px-4 py-2 flex items-center justify-between text-xs">
|
214 |
+
<div class="text-gray-400">
|
215 |
+
<span class="text-green-400">Ready</span> | <span>CPU: 12%</span> | <span>MEM: 34%</span>
|
216 |
+
</div>
|
217 |
+
<div class="flex items-center space-x-4">
|
218 |
+
<div class="flex items-center text-gray-400">
|
219 |
+
<i class="fas fa-shield-alt mr-1 text-green-400"></i>
|
220 |
+
<span>Secure</span>
|
221 |
+
</div>
|
222 |
+
<div class="flex items-center text-gray-400">
|
223 |
+
<i class="fas fa-network-wired mr-1 text-blue-400"></i>
|
224 |
+
<span>192.168.1.105</span>
|
225 |
+
</div>
|
226 |
+
<div class="flex items-center text-gray-400">
|
227 |
+
<i class="fas fa-clock mr-1 text-yellow-400"></i>
|
228 |
+
<span id="current-time"></span>
|
229 |
+
</div>
|
230 |
+
</div>
|
231 |
+
</div>
|
232 |
+
</div>
|
233 |
+
|
234 |
+
<script>
|
235 |
+
// Update current time
|
236 |
+
function updateTime() {
|
237 |
+
const now = new Date();
|
238 |
+
document.getElementById('current-time').textContent = now.toLocaleTimeString();
|
239 |
+
}
|
240 |
+
setInterval(updateTime, 1000);
|
241 |
+
updateTime();
|
242 |
+
|
243 |
+
// Command history
|
244 |
+
let commandHistory = [];
|
245 |
+
let historyIndex = -1;
|
246 |
+
|
247 |
+
// Terminal functions
|
248 |
+
const terminalOutput = document.getElementById('terminal-output');
|
249 |
+
const commandInput = document.getElementById('command-input');
|
250 |
+
|
251 |
+
// Focus input on any click in the terminal
|
252 |
+
document.addEventListener('click', () => {
|
253 |
+
commandInput.focus();
|
254 |
+
});
|
255 |
+
|
256 |
+
// Handle command execution
|
257 |
+
function executeCommand() {
|
258 |
+
const command = commandInput.value.trim();
|
259 |
+
if (!command) return;
|
260 |
+
|
261 |
+
// Add to history
|
262 |
+
commandHistory.push(command);
|
263 |
+
historyIndex = commandHistory.length;
|
264 |
+
|
265 |
+
// Display command
|
266 |
+
addCommandToTerminal(command);
|
267 |
+
|
268 |
+
// Process command
|
269 |
+
processCommand(command);
|
270 |
+
|
271 |
+
// Clear input
|
272 |
+
commandInput.value = '';
|
273 |
+
}
|
274 |
+
|
275 |
+
// Handle Enter key
|
276 |
+
commandInput.addEventListener('keypress', (e) => {
|
277 |
+
if (e.key === 'Enter') {
|
278 |
+
executeCommand();
|
279 |
+
}
|
280 |
+
});
|
281 |
+
|
282 |
+
// Handle up/down arrows for history
|
283 |
+
commandInput.addEventListener('keydown', (e) => {
|
284 |
+
if (e.key === 'ArrowUp' && commandHistory.length > 0) {
|
285 |
+
e.preventDefault();
|
286 |
+
if (historyIndex > 0) historyIndex--;
|
287 |
+
commandInput.value = commandHistory[historyIndex] || '';
|
288 |
+
} else if (e.key === 'ArrowDown' && commandHistory.length > 0) {
|
289 |
+
e.preventDefault();
|
290 |
+
if (historyIndex < commandHistory.length - 1) historyIndex++;
|
291 |
+
commandInput.value = commandHistory[historyIndex] || '';
|
292 |
+
if (historyIndex === commandHistory.length - 1) {
|
293 |
+
commandInput.value = '';
|
294 |
+
historyIndex = commandHistory.length;
|
295 |
+
}
|
296 |
+
}
|
297 |
+
});
|
298 |
+
|
299 |
+
// Add command to terminal output
|
300 |
+
function addCommandToTerminal(command) {
|
301 |
+
const commandElement = document.createElement('div');
|
302 |
+
commandElement.className = 'text-green-400 mb-2';
|
303 |
+
commandElement.innerHTML = `
|
304 |
+
<div class="flex items-baseline">
|
305 |
+
<span class="text-purple-400 font-mono">hacktool-pro</span>
|
306 |
+
<span class="text-gray-500 mx-1">@</span>
|
307 |
+
<span class="text-yellow-400 font-mono">localhost</span>
|
308 |
+
<span class="text-gray-500 mx-1">~</span>
|
309 |
+
<span class="text-gray-500">$</span>
|
310 |
+
<span class="ml-2">${command}</span>
|
311 |
+
</div>
|
312 |
+
`;
|
313 |
+
terminalOutput.appendChild(commandElement);
|
314 |
+
terminalOutput.scrollTop = terminalOutput.scrollHeight;
|
315 |
+
}
|
316 |
+
|
317 |
+
// Add output to terminal
|
318 |
+
function addOutputToTerminal(output, isError = false) {
|
319 |
+
const outputElement = document.createElement('div');
|
320 |
+
outputElement.className = isError ? 'text-red-400 mb-4 font-mono text-sm' : 'text-gray-300 mb-4 font-mono text-sm';
|
321 |
+
outputElement.innerHTML = output;
|
322 |
+
terminalOutput.appendChild(outputElement);
|
323 |
+
terminalOutput.scrollTop = terminalOutput.scrollHeight;
|
324 |
+
}
|
325 |
+
|
326 |
+
// Process commands
|
327 |
+
function processCommand(command) {
|
328 |
+
const cmd = command.split(' ')[0].toLowerCase();
|
329 |
+
const args = command.split(' ').slice(1);
|
330 |
+
|
331 |
+
switch(cmd) {
|
332 |
+
case 'help':
|
333 |
+
showHelp();
|
334 |
+
break;
|
335 |
+
case 'clear':
|
336 |
+
terminalOutput.innerHTML = '';
|
337 |
+
break;
|
338 |
+
case 'scan':
|
339 |
+
runScan(args);
|
340 |
+
break;
|
341 |
+
case 'exploit':
|
342 |
+
runExploit(args);
|
343 |
+
break;
|
344 |
+
case 'crack':
|
345 |
+
runCrack(args);
|
346 |
+
break;
|
347 |
+
case 'brute':
|
348 |
+
runBrute(args);
|
349 |
+
break;
|
350 |
+
case 'sniff':
|
351 |
+
runSniff(args);
|
352 |
+
break;
|
353 |
+
case 'spoof':
|
354 |
+
runSpoof(args);
|
355 |
+
break;
|
356 |
+
case 'dos':
|
357 |
+
runDos(args);
|
358 |
+
break;
|
359 |
+
case 'mitm':
|
360 |
+
runMitm(args);
|
361 |
+
break;
|
362 |
+
case 'enum':
|
363 |
+
runEnum(args);
|
364 |
+
break;
|
365 |
+
case 'list':
|
366 |
+
showPresetCommands();
|
367 |
+
break;
|
368 |
+
default:
|
369 |
+
addOutputToTerminal(`Command not found: ${cmd}. Type 'help' for available commands.`, true);
|
370 |
+
}
|
371 |
+
}
|
372 |
+
|
373 |
+
// Show help
|
374 |
+
function showHelp() {
|
375 |
+
const helpText = `
|
376 |
+
<div class="mb-2 text-blue-400">Available Commands:</div>
|
377 |
+
<div class="grid grid-cols-2 gap-2 mb-2">
|
378 |
+
<div><span class="text-green-400">help</span> - Show this help message</div>
|
379 |
+
<div><span class="text-green-400">clear</span> - Clear the terminal</div>
|
380 |
+
<div><span class="text-green-400">scan</span> [target] - Run network scan</div>
|
381 |
+
<div><span class="text-green-400">exploit</span> [target] - Run exploit</div>
|
382 |
+
<div><span class="text-green-400">crack</span> [hash] - Crack password hash</div>
|
383 |
+
<div><span class="text-green-400">brute</span> [service] - Brute force attack</div>
|
384 |
+
<div><span class="text-green-400">sniff</span> [interface] - Packet sniffing</div>
|
385 |
+
<div><span class="text-green-400">spoof</span> [target] - ARP spoofing</div>
|
386 |
+
<div><span class="text-green-400">dos</span> [target] - Denial of Service</div>
|
387 |
+
<div><span class="text-green-400">mitm</span> [target] - Man in the Middle</div>
|
388 |
+
<div><span class="text-green-400">enum</span> [service] - Service enumeration</div>
|
389 |
+
<div><span class="text-green-400">list</span> - Show preset commands</div>
|
390 |
+
</div>
|
391 |
+
<div class="text-gray-500 text-xs">Use preset commands from sidebar for specific tools</div>
|
392 |
+
`;
|
393 |
+
addOutputToTerminal(helpText);
|
394 |
+
}
|
395 |
+
|
396 |
+
// Show preset commands
|
397 |
+
function showPresetCommands() {
|
398 |
+
let commands = `
|
399 |
+
<div class="mb-2 text-blue-400">Preset Commands (click in sidebar):</div>
|
400 |
+
<div class="grid grid-cols-2 gap-1 text-xs">
|
401 |
+
`;
|
402 |
+
|
403 |
+
for (let i = 1; i <= 40; i++) {
|
404 |
+
const cmdName = getPresetCommandName(i);
|
405 |
+
commands += `<div>${i}. ${cmdName}</div>`;
|
406 |
+
}
|
407 |
+
|
408 |
+
commands += `</div>`;
|
409 |
+
addOutputToTerminal(commands);
|
410 |
+
}
|
411 |
+
|
412 |
+
// Run preset command
|
413 |
+
function runPresetCommand(num) {
|
414 |
+
const cmdName = getPresetCommandName(num);
|
415 |
+
const cmd = getPresetCommand(num);
|
416 |
+
|
417 |
+
// Simulate typing
|
418 |
+
commandInput.value = cmd;
|
419 |
+
|
420 |
+
// Execute after a short delay
|
421 |
+
setTimeout(() => {
|
422 |
+
executeCommand();
|
423 |
+
}, 100);
|
424 |
+
}
|
425 |
+
|
426 |
+
// Get preset command name
|
427 |
+
function getPresetCommandName(num) {
|
428 |
+
const commands = [
|
429 |
+
"Port Scan", "Ping Sweep", "DNS Enum", "WHOIS Lookup", "Subdomain Brute",
|
430 |
+
"HTTP Header", "SSL Check", "SQL Injection", "XSS Test", "CSRF Test",
|
431 |
+
"Brute Force", "Hash Crack", "Wifi Scan", "ARP Spoof", "MAC Changer",
|
432 |
+
"Packet Sniff", "MITM Attack", "DOS Attack", "SSH Brute", "FTP Brute",
|
433 |
+
"RDP Brute", "SMTP Enum", "SNMP Walk", "LDAP Enum", "SMB Enum",
|
434 |
+
"NFS Enum", "MySQL Brute", "MSSQL Brute", "Oracle Brute", "Postgres Brute",
|
435 |
+
"Redis Brute", "MongoDB Brute", "Elastic Brute", "Jenkins Brute", "Docker Enum",
|
436 |
+
"Kubernetes Enum", "AWS Enum", "Azure Enum", "GCP Enum", "Metasploit"
|
437 |
+
];
|
438 |
+
return commands[num - 1] || "Unknown Command";
|
439 |
+
}
|
440 |
+
|
441 |
+
// Get preset command
|
442 |
+
function getPresetCommand(num) {
|
443 |
+
const commands = [
|
444 |
+
"scan -p 1-1024", "scan -ping", "enum dns", "whois lookup", "scan -subdomains",
|
445 |
+
"scan -http", "scan -ssl", "exploit sql", "exploit xss", "exploit csrf",
|
446 |
+
"brute all", "crack md5", "scan -wifi", "spoof arp", "spoof mac",
|
447 |
+
"sniff eth0", "mitm start", "dos flood", "brute ssh", "brute ftp",
|
448 |
+
"brute rdp", "enum smtp", "enum snmp", "enum ldap", "enum smb",
|
449 |
+
"enum nfs", "brute mysql", "brute mssql", "brute oracle", "brute postgres",
|
450 |
+
"brute redis", "brute mongodb", "brute elastic", "brute jenkins", "enum docker",
|
451 |
+
"enum kubernetes", "enum aws", "enum azure", "enum gcp", "exploit msf"
|
452 |
+
];
|
453 |
+
return commands[num - 1] || "help";
|
454 |
+
}
|
455 |
+
|
456 |
+
// Command functions
|
457 |
+
function runScan(args) {
|
458 |
+
let output = "<div class='text-yellow-400'>Starting scan...</div>";
|
459 |
+
|
460 |
+
if (args.includes('-p')) {
|
461 |
+
output += `
|
462 |
+
<div class='ml-4'>
|
463 |
+
<div>Scanning ports 1-1024 on target...</div>
|
464 |
+
<div class='text-green-400'>β Port 22 (SSH) open</div>
|
465 |
+
<div class='text-green-400'>β Port 80 (HTTP) open</div>
|
466 |
+
<div class='text-green-400'>β Port 443 (HTTPS) open</div>
|
467 |
+
<div class='text-gray-500'>β Port 3389 (RDP) closed</div>
|
468 |
+
<div>Scan completed in 4.2 seconds</div>
|
469 |
+
</div>
|
470 |
+
`;
|
471 |
+
} else if (args.includes('-ping')) {
|
472 |
+
output += `
|
473 |
+
<div class='ml-4'>
|
474 |
+
<div>Pinging network range 192.168.1.1-254...</div>
|
475 |
+
<div class='text-green-400'>β 192.168.1.1 (Router) responding</div>
|
476 |
+
<div class='text-green-400'>β 192.168.1.105 (This machine)</div>
|
477 |
+
<div class='text-green-400'>β 192.168.1.120 (Unknown device)</div>
|
478 |
+
<div>5 hosts found in 8.7 seconds</div>
|
479 |
+
</div>
|
480 |
+
`;
|
481 |
+
} else if (args.includes('-wifi')) {
|
482 |
+
output += `
|
483 |
+
<div class='ml-4'>
|
484 |
+
<div>Scanning nearby WiFi networks...</div>
|
485 |
+
<div class='text-green-400'>β HomeWiFi (Signal: 85%, Security: WPA2)</div>
|
486 |
+
<div class='text-green-400'>β GuestNetwork (Signal: 60%, Security: Open)</div>
|
487 |
+
<div class='text-green-400'>β NeighborWiFi (Signal: 45%, Security: WPA3)</div>
|
488 |
+
<div>3 networks found</div>
|
489 |
+
</div>
|
490 |
+
`;
|
491 |
+
} else if (args.includes('-subdomains')) {
|
492 |
+
output += `
|
493 |
+
<div class='ml-4'>
|
494 |
+
<div>Brute-forcing subdomains for example.com...</div>
|
495 |
+
<div class='text-green-400'>β Found: www.example.com</div>
|
496 |
+
<div class='text-green-400'>β Found: mail.example.com</div>
|
497 |
+
<div class='text-green-400'>β Found: api.example.com</div>
|
498 |
+
<div class='text-green-400'>β Found: dev.example.com</div>
|
499 |
+
<div>4 subdomains discovered</div>
|
500 |
+
</div>
|
501 |
+
`;
|
502 |
+
} else if (args.includes('-http')) {
|
503 |
+
output += `
|
504 |
+
<div class='ml-4'>
|
505 |
+
<div>Fetching HTTP headers for target...</div>
|
506 |
+
<div>Server: Apache/2.4.41</div>
|
507 |
+
<div>X-Powered-By: PHP/7.4.3</div>
|
508 |
+
<div>Content-Type: text/html; charset=UTF-8</div>
|
509 |
+
<div>X-Frame-Options: SAMEORIGIN</div>
|
510 |
+
</div>
|
511 |
+
`;
|
512 |
+
} else if (args.includes('-ssl')) {
|
513 |
+
output += `
|
514 |
+
<div class='ml-4'>
|
515 |
+
<div>Checking SSL certificate...</div>
|
516 |
+
<div>Issuer: Let's Encrypt</div>
|
517 |
+
<div>Valid until: 2023-12-31</div>
|
518 |
+
<div>Signature Algorithm: SHA256-RSA</div>
|
519 |
+
<div class='text-yellow-400'>Warning: TLS 1.0 enabled</div>
|
520 |
+
</div>
|
521 |
+
`;
|
522 |
+
} else {
|
523 |
+
output = "<div class='text-red-400'>Invalid scan type. Use 'scan -p' for port scan, 'scan -ping' for ping sweep, etc.</div>";
|
524 |
+
}
|
525 |
+
|
526 |
+
addOutputToTerminal(output);
|
527 |
+
}
|
528 |
+
|
529 |
+
function runExploit(args) {
|
530 |
+
let output = "<div class='text-yellow-400'>Preparing exploit...</div>";
|
531 |
+
|
532 |
+
if (args.includes('sql')) {
|
533 |
+
output += `
|
534 |
+
<div class='ml-4'>
|
535 |
+
<div>Testing for SQL injection vulnerabilities...</div>
|
536 |
+
<div class='text-green-400'>β Vulnerable parameter found: 'id'</div>
|
537 |
+
<div>Attempting UNION-based injection...</div>
|
538 |
+
<div class='text-green-400'>β Success! Database version: MySQL 5.7.32</div>
|
539 |
+
<div>Dumping database names:</div>
|
540 |
+
<div class='ml-4'>- information_schema</div>
|
541 |
+
<div class='ml-4'>- website_db</div>
|
542 |
+
<div class='ml-4'>- users_db</div>
|
543 |
+
</div>
|
544 |
+
`;
|
545 |
+
} else if (args.includes('xss')) {
|
546 |
+
output += `
|
547 |
+
<div class='ml-4'>
|
548 |
+
<div>Testing for XSS vulnerabilities...</div>
|
549 |
+
<div class='text-green-400'>β Reflected XSS found in search parameter</div>
|
550 |
+
<div class='text-green-400'>β Stored XSS found in comment form</div>
|
551 |
+
<div>Example payload: <script>alert(1)</script></div>
|
552 |
+
</div>
|
553 |
+
`;
|
554 |
+
} else if (args.includes('csrf')) {
|
555 |
+
output += `
|
556 |
+
<div class='ml-4'>
|
557 |
+
<div>Testing for CSRF vulnerabilities...</div>
|
558 |
+
<div class='text-green-400'>β No CSRF token found in password change form</div>
|
559 |
+
<div>Vulnerable to CSRF attacks</div>
|
560 |
+
</div>
|
561 |
+
`;
|
562 |
+
} else if (args.includes('msf')) {
|
563 |
+
output += `
|
564 |
+
<div class='ml-4'>
|
565 |
+
<div>Starting Metasploit framework...</div>
|
566 |
+
<div>msf6 > use exploit/multi/handler</div>
|
567 |
+
<div>msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp</div>
|
568 |
+
<div>msf6 exploit(multi/handler) > set LHOST 192.168.1.105</div>
|
569 |
+
<div>msf6 exploit(multi/handler) > set LPORT 4444</div>
|
570 |
+
<div>msf6 exploit(multi/handler) > exploit</div>
|
571 |
+
<div class='text-green-400'>[*] Started reverse TCP handler on 192.168.1.105:4444</div>
|
572 |
+
</div>
|
573 |
+
`;
|
574 |
+
} else {
|
575 |
+
output = "<div class='text-red-400'>Invalid exploit type. Use 'exploit sql', 'exploit xss', etc.</div>";
|
576 |
+
}
|
577 |
+
|
578 |
+
addOutputToTerminal(output);
|
579 |
+
}
|
580 |
+
|
581 |
+
function runCrack(args) {
|
582 |
+
let output = "<div class='text-yellow-400'>Starting hash cracking...</div>";
|
583 |
+
|
584 |
+
if (args.includes('md5')) {
|
585 |
+
output += `
|
586 |
+
<div class='ml-4'>
|
587 |
+
<div>Hash: 5f4dcc3b5aa765d61d8327deb882cf99</div>
|
588 |
+
<div>Using rockyou.txt wordlist...</div>
|
589 |
+
<div class='text-green-400'>β Cracked: password (0.4 seconds)</div>
|
590 |
+
</div>
|
591 |
+
`;
|
592 |
+
} else {
|
593 |
+
output = "<div class='text-red-400'>Invalid hash type. Use 'crack md5' for MD5 hashes.</div>";
|
594 |
+
}
|
595 |
+
|
596 |
+
addOutputToTerminal(output);
|
597 |
+
}
|
598 |
+
|
599 |
+
function runBrute(args) {
|
600 |
+
let output = "<div class='text-yellow-400'>Preparing brute force attack...</div>";
|
601 |
+
|
602 |
+
if (args.includes('ssh')) {
|
603 |
+
output += `
|
604 |
+
<div class='ml-4'>
|
605 |
+
<div>Target: SSH (192.168.1.120:22)</div>
|
606 |
+
<div>Username list: top-usernames.txt</div>
|
607 |
+
<div>Password list: rockyou.txt</div>
|
608 |
+
<div>Starting attack...</div>
|
609 |
+
<div class='text-green-400'>β Found credentials: admin:admin123</div>
|
610 |
+
<div>Time elapsed: 12 minutes</div>
|
611 |
+
</div>
|
612 |
+
`;
|
613 |
+
} else if (args.includes('ftp')) {
|
614 |
+
output += `
|
615 |
+
<div class='ml-4'>
|
616 |
+
<div>Target: FTP (192.168.1.120:21)</div>
|
617 |
+
<div>Username list: common-ftp-users.txt</div>
|
618 |
+
<div>Password list: rockyou.txt</div>
|
619 |
+
<div>Starting attack...</div>
|
620 |
+
<div class='text-green-400'>β Found credentials: ftpuser:ftp123</div>
|
621 |
+
<div>Time elapsed: 8 minutes</div>
|
622 |
+
</div>
|
623 |
+
`;
|
624 |
+
} else if (args.includes('all')) {
|
625 |
+
output += `
|
626 |
+
<div class='ml-4'>
|
627 |
+
<div>Running multi-service brute force...</div>
|
628 |
+
<div class='text-green-400'>β SSH: admin:admin123</div>
|
629 |
+
<div class='text-green-400'>β FTP: ftpuser:ftp123</div>
|
630 |
+
<div class='text-red-400'>β RDP: No valid credentials</div>
|
631 |
+
<div>Completed in 25 minutes</div>
|
632 |
+
</div>
|
633 |
+
`;
|
634 |
+
} else {
|
635 |
+
output = "<div class='text-red-400'>Invalid service. Use 'brute ssh', 'brute ftp', etc.</div>";
|
636 |
+
}
|
637 |
+
|
638 |
+
addOutputToTerminal(output);
|
639 |
+
}
|
640 |
+
|
641 |
+
function runSniff(args) {
|
642 |
+
let output = "<div class='text-yellow-400'>Starting packet sniffing...</div>";
|
643 |
+
|
644 |
+
if (args.includes('eth0') || args.includes('start')) {
|
645 |
+
output += `
|
646 |
+
<div class='ml-4'>
|
647 |
+
<div>Interface: eth0</div>
|
648 |
+
<div>Filter: tcp port 80</div>
|
649 |
+
<div>Capturing packets (Ctrl+C to stop)...</div>
|
650 |
+
<div class='text-xs font-mono mt-2'>
|
651 |
+
<div>192.168.1.105:52341 -> 142.250.190.46:80 [GET / HTTP/1.1]</div>
|
652 |
+
<div>192.168.1.105:52342 -> 151.101.1.69:80 [GET /static/logo.png HTTP/1.1]</div>
|
653 |
+
<div>192.168.1.120:52343 -> 192.168.1.105:80 [POST /login HTTP/1.1]</div>
|
654 |
+
<div>... capturing more packets ...</div>
|
655 |
+
</div>
|
656 |
+
</div>
|
657 |
+
`;
|
658 |
+
} else {
|
659 |
+
output = "<div class='text-red-400'>Invalid interface. Use 'sniff eth0'.</div>";
|
660 |
+
}
|
661 |
+
|
662 |
+
addOutputToTerminal(output);
|
663 |
+
}
|
664 |
+
|
665 |
+
function runSpoof(args) {
|
666 |
+
let output = "<div class='text-yellow-400'>Preparing spoofing attack...</div>";
|
667 |
+
|
668 |
+
if (args.includes('arp')) {
|
669 |
+
output += `
|
670 |
+
<div class='ml-4'>
|
671 |
+
<div>Target: 192.168.1.120</div>
|
672 |
+
<div>Gateway: 192.168.1.1</div>
|
673 |
+
<div>Starting ARP spoofing...</div>
|
674 |
+
<div class='text-green-400'>β Poisoning ARP tables</div>
|
675 |
+
<div>Redirecting traffic through this machine</div>
|
676 |
+
<div class='text-yellow-400'>Warning: This will disrupt network connectivity</div>
|
677 |
+
</div>
|
678 |
+
`;
|
679 |
+
} else if (args.includes('mac')) {
|
680 |
+
output += `
|
681 |
+
<div class='ml-4'>
|
682 |
+
<div>Interface: eth0</div>
|
683 |
+
<div>Current MAC: 00:1A:2B:3C:4D:5E</div>
|
684 |
+
<div>Changing to random MAC address...</div>
|
685 |
+
<div class='text-green-400'>β New MAC: 12:34:56:78:90:AB</div>
|
686 |
+
</div>
|
687 |
+
`;
|
688 |
+
} else {
|
689 |
+
output = "<div class='text-red-400'>Invalid spoof type. Use 'spoof arp' or 'spoof mac'.</div>";
|
690 |
+
}
|
691 |
+
|
692 |
+
addOutputToTerminal(output);
|
693 |
+
}
|
694 |
+
|
695 |
+
function runDos(args) {
|
696 |
+
let output = "<div class='text-yellow-400'>Preparing DoS attack...</div>";
|
697 |
+
|
698 |
+
if (args.includes('flood')) {
|
699 |
+
output += `
|
700 |
+
<div class='ml-4'>
|
701 |
+
<div>Target: 192.168.1.120:80</div>
|
702 |
+
<div>Attack type: SYN Flood</div>
|
703 |
+
<div>Starting attack with 1000 packets/second...</div>
|
704 |
+
<div class='text-green-400'>β Target response slowing down</div>
|
705 |
+
<div class='text-green-400'>β Target service unavailable</div>
|
706 |
+
<div class='text-yellow-400'>Warning: This is illegal without permission</div>
|
707 |
+
</div>
|
708 |
+
`;
|
709 |
+
} else {
|
710 |
+
output = "<div class='text-red-400'>Invalid DoS type. Use 'dos flood'.</div>";
|
711 |
+
}
|
712 |
+
|
713 |
+
addOutputToTerminal(output);
|
714 |
+
}
|
715 |
+
|
716 |
+
function runMitm(args) {
|
717 |
+
let output = "<div class='text-yellow-400'>Preparing MITM attack...</div>";
|
718 |
+
|
719 |
+
if (args.includes('start')) {
|
720 |
+
output += `
|
721 |
+
<div class='ml-4'>
|
722 |
+
<div>Target: 192.168.1.120</div>
|
723 |
+
<div>Gateway: 192.168.1.1</div>
|
724 |
+
<div>Starting ARP poisoning...</div>
|
725 |
+
<div class='text-green-400'>β Traffic redirected</div>
|
726 |
+
<div>Starting SSLstrip...</div>
|
727 |
+
<div class='text-green-400'>β Capturing plaintext credentials</div>
|
728 |
+
<div>Starting packet inspection...</div>
|
729 |
+
<div class='text-xs font-mono mt-2'>
|
730 |
+
<div>[HTTP] username: johndoe, password: s3cr3t</div>
|
731 |
+
<div>[COOKIE] sessionid: a1b2c3d4e5f6</div>
|
732 |
+
<div>... capturing more data ...</div>
|
733 |
+
</div>
|
734 |
+
</div>
|
735 |
+
`;
|
736 |
+
} else {
|
737 |
+
output = "<div class='text-red-400'>Invalid command. Use 'mitm start'.</div>";
|
738 |
+
}
|
739 |
+
|
740 |
+
addOutputToTerminal(output);
|
741 |
+
}
|
742 |
+
|
743 |
+
function runEnum(args) {
|
744 |
+
let output = "<div class='text-yellow-400'>Starting enumeration...</div>";
|
745 |
+
|
746 |
+
if (args.includes('dns')) {
|
747 |
+
output += `
|
748 |
+
<div class='ml-4'>
|
749 |
+
<div>Target: example.com</div>
|
750 |
+
<div>Performing DNS enumeration...</div>
|
751 |
+
<div class='text-green-400'>β A record: 93.184.216.34</div>
|
752 |
+
<div class='text-green-400'>β MX records: mail.example.com</div>
|
753 |
+
<div class='text-green-400'>β TXT records: "v=spf1 include:_spf.example.com ~all"</div>
|
754 |
+
<div>DNS enumeration complete</div>
|
755 |
+
</div>
|
756 |
+
`;
|
757 |
+
} else if (args.includes('smtp')) {
|
758 |
+
output += `
|
759 |
+
<div class='ml-4'>
|
760 |
+
<div>Target: mail.example.com:25</div>
|
761 |
+
<div>Enumerating SMTP users...</div>
|
762 |
+
<div class='text-green-400'>β Valid user: admin@example.com</div>
|
763 |
+
<div class='text-green-400'>β Valid user: support@example.com</div>
|
764 |
+
<div class='text-red-400'>β Invalid user: root@example.com</div>
|
765 |
+
<div>Found 2 valid email addresses</div>
|
766 |
+
</div>
|
767 |
+
`;
|
768 |
+
} else if (args.includes('snmp')) {
|
769 |
+
output += `
|
770 |
+
<div class='ml-4'>
|
771 |
+
<div>Target: 192.168.1.120</div>
|
772 |
+
<div>Community string: public</div>
|
773 |
+
<div>Walking SNMP tree...</div>
|
774 |
+
<div class='text-green-400'>β System: Cisco Router</div>
|
775 |
+
<div class='text-green-400'>β Uptime: 14 days, 6 hours</div>
|
776 |
+
<div class='text-green-400'>β Interfaces: 4</div>
|
777 |
+
<div>SNMP enumeration complete</div>
|
778 |
+
</div>
|
779 |
+
`;
|
780 |
+
} else {
|
781 |
+
output = "<div class='text-red-400'>Invalid service. Use 'enum dns', 'enum smtp', etc.</div>";
|
782 |
+
}
|
783 |
+
|
784 |
+
addOutputToTerminal(output);
|
785 |
+
}
|
786 |
+
</script>
|
787 |
+
<p style="border-radius: 8px; text-align: center; font-size: 12px; color: #fff; margin-top: 16px;position: fixed; left: 8px; bottom: 8px; z-index: 10; background: rgba(0, 0, 0, 0.8); padding: 4px 8px;">Made with <img src="https://enzostvs-deepsite.hf.space/logo.svg" alt="DeepSite Logo" style="width: 16px; height: 16px; vertical-align: middle;display:inline-block;margin-right:3px;filter:brightness(0) invert(1);"><a href="https://enzostvs-deepsite.hf.space" style="color: #fff;text-decoration: underline;" target="_blank" >DeepSite</a> - 𧬠<a href="https://enzostvs-deepsite.hf.space?remix=ash-coded-it/hacktool" style="color: #fff;text-decoration: underline;" target="_blank" >Remix</a></p></body>
|
788 |
+
</html>
|
prompts.txt
ADDED
File without changes
|