ash-coded-it commited on
Commit
20e694a
Β·
verified Β·
1 Parent(s): e80afbf

Add 3 files

Browse files
Files changed (3) hide show
  1. README.md +6 -4
  2. index.html +788 -19
  3. prompts.txt +0 -0
README.md CHANGED
@@ -1,10 +1,12 @@
1
  ---
2
- title: Hacktool
3
- emoji: πŸƒ
4
  colorFrom: blue
5
- colorTo: purple
6
  sdk: static
7
  pinned: false
 
 
8
  ---
9
 
10
- Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
 
1
  ---
2
+ title: hacktool
3
+ emoji: 🐳
4
  colorFrom: blue
5
+ colorTo: red
6
  sdk: static
7
  pinned: false
8
+ tags:
9
+ - deepsite
10
  ---
11
 
12
+ Check out the configuration reference at https://huggingface.co/docs/hub/spaces-config-reference
index.html CHANGED
@@ -1,19 +1,788 @@
1
- <!doctype html>
2
- <html>
3
- <head>
4
- <meta charset="utf-8" />
5
- <meta name="viewport" content="width=device-width" />
6
- <title>My static Space</title>
7
- <link rel="stylesheet" href="style.css" />
8
- </head>
9
- <body>
10
- <div class="card">
11
- <h1>Welcome to your static Space!</h1>
12
- <p>You can modify this app directly by editing <i>index.html</i> in the Files and versions tab.</p>
13
- <p>
14
- Also don't forget to check the
15
- <a href="https://huggingface.co/docs/hub/spaces" target="_blank">Spaces documentation</a>.
16
- </p>
17
- </div>
18
- </body>
19
- </html>
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ <!DOCTYPE html>
2
+ <html lang="en">
3
+ <head>
4
+ <meta charset="UTF-8">
5
+ <meta name="viewport" content="width=device-width, initial-scale=1.0">
6
+ <title>HackTool Pro - macOS</title>
7
+ <script src="https://cdn.tailwindcss.com"></script>
8
+ <link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.4.0/css/all.min.css">
9
+ <style>
10
+ @keyframes blink {
11
+ 0%, 100% { opacity: 1; }
12
+ 50% { opacity: 0; }
13
+ }
14
+ .cursor-blink {
15
+ animation: blink 1s step-end infinite;
16
+ }
17
+ .window {
18
+ box-shadow: 0 10px 30px rgba(0, 0, 0, 0.2);
19
+ border-radius: 8px;
20
+ overflow: hidden;
21
+ }
22
+ .terminal-bg {
23
+ background-color: #1a1a1a;
24
+ }
25
+ .scrollbar-hide::-webkit-scrollbar {
26
+ display: none;
27
+ }
28
+ .command-history {
29
+ height: calc(100% - 40px);
30
+ }
31
+ .macos-traffic-light {
32
+ width: 12px;
33
+ height: 12px;
34
+ border-radius: 50%;
35
+ margin-right: 8px;
36
+ }
37
+ .sidebar-item:hover {
38
+ background-color: rgba(255, 255, 255, 0.1);
39
+ }
40
+ .sidebar-item.active {
41
+ background-color: rgba(0, 122, 255, 0.2);
42
+ border-left: 3px solid #007aff;
43
+ }
44
+ .typewriter {
45
+ overflow: hidden;
46
+ white-space: nowrap;
47
+ margin: 0 auto;
48
+ letter-spacing: 0.15em;
49
+ }
50
+ </style>
51
+ </head>
52
+ <body class="bg-gray-900 text-white h-screen overflow-hidden flex items-center justify-center p-4">
53
+ <div class="window w-full max-w-6xl h-[90vh] flex flex-col">
54
+ <!-- Title Bar -->
55
+ <div class="bg-gray-800 rounded-t-lg flex items-center px-4 py-2">
56
+ <div class="flex mr-4">
57
+ <div class="macos-traffic-light bg-red-500"></div>
58
+ <div class="macos-traffic-light bg-yellow-500"></div>
59
+ <div class="macos-traffic-light bg-green-500"></div>
60
+ </div>
61
+ <div class="text-sm font-medium text-gray-300 flex-1 text-center">
62
+ HackTool Pro - Terminal
63
+ </div>
64
+ <div class="text-xs text-gray-500">
65
+ v2.4.1
66
+ </div>
67
+ </div>
68
+
69
+ <!-- Main Content -->
70
+ <div class="flex flex-1 overflow-hidden">
71
+ <!-- Sidebar -->
72
+ <div class="w-64 bg-gray-800 p-4 flex flex-col">
73
+ <div class="mb-6">
74
+ <div class="text-xs uppercase text-gray-500 mb-2">Quick Actions</div>
75
+ <button class="bg-blue-600 hover:bg-blue-700 text-white px-3 py-1 rounded text-sm w-full mb-2 flex items-center">
76
+ <i class="fas fa-bolt mr-2"></i> Quick Scan
77
+ </button>
78
+ <button class="bg-green-600 hover:bg-green-700 text-white px-3 py-1 rounded text-sm w-full flex items-center">
79
+ <i class="fas fa-shield-alt mr-2"></i> Defense Mode
80
+ </button>
81
+ </div>
82
+
83
+ <div class="mb-6">
84
+ <div class="text-xs uppercase text-gray-500 mb-2">Hacking Tools</div>
85
+ <div class="space-y-1">
86
+ <div class="sidebar-item active px-3 py-2 rounded text-sm cursor-pointer flex items-center">
87
+ <i class="fas fa-terminal mr-2 text-blue-400"></i> Terminal
88
+ </div>
89
+ <div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
90
+ <i class="fas fa-network-wired mr-2 text-purple-400"></i> Network Scanner
91
+ </div>
92
+ <div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
93
+ <i class="fas fa-lock mr-2 text-yellow-400"></i> Password Cracker
94
+ </div>
95
+ <div class="sidebar-item px-3 py-2 rounded text-sm cursor-pointer flex items-center">
96
+ <i class="fas fa-code mr-2 text-red-400"></i> Exploit Database
97
+ </div>
98
+ </div>
99
+ </div>
100
+
101
+ <div class="mb-6 flex-1">
102
+ <div class="text-xs uppercase text-gray-500 mb-2">Preset Commands</div>
103
+ <div class="bg-gray-700 rounded p-2 h-64 overflow-y-auto scrollbar-hide">
104
+ <div class="grid grid-cols-2 gap-2">
105
+ <button onclick="runPresetCommand(1)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">1. Port Scan</button>
106
+ <button onclick="runPresetCommand(2)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">2. Ping Sweep</button>
107
+ <button onclick="runPresetCommand(3)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">3. DNS Enum</button>
108
+ <button onclick="runPresetCommand(4)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">4. WHOIS Lookup</button>
109
+ <button onclick="runPresetCommand(5)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">5. Subdomain Brute</button>
110
+ <button onclick="runPresetCommand(6)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">6. HTTP Header</button>
111
+ <button onclick="runPresetCommand(7)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">7. SSL Check</button>
112
+ <button onclick="runPresetCommand(8)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">8. SQL Injection</button>
113
+ <button onclick="runPresetCommand(9)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">9. XSS Test</button>
114
+ <button onclick="runPresetCommand(10)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">10. CSRF Test</button>
115
+ <button onclick="runPresetCommand(11)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">11. Brute Force</button>
116
+ <button onclick="runPresetCommand(12)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">12. Hash Crack</button>
117
+ <button onclick="runPresetCommand(13)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">13. Wifi Scan</button>
118
+ <button onclick="runPresetCommand(14)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">14. ARP Spoof</button>
119
+ <button onclick="runPresetCommand(15)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">15. MAC Changer</button>
120
+ <button onclick="runPresetCommand(16)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">16. Packet Sniff</button>
121
+ <button onclick="runPresetCommand(17)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">17. MITM Attack</button>
122
+ <button onclick="runPresetCommand(18)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">18. DOS Attack</button>
123
+ <button onclick="runPresetCommand(19)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">19. SSH Brute</button>
124
+ <button onclick="runPresetCommand(20)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">20. FTP Brute</button>
125
+ <button onclick="runPresetCommand(21)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">21. RDP Brute</button>
126
+ <button onclick="runPresetCommand(22)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">22. SMTP Enum</button>
127
+ <button onclick="runPresetCommand(23)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">23. SNMP Walk</button>
128
+ <button onclick="runPresetCommand(24)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">24. LDAP Enum</button>
129
+ <button onclick="runPresetCommand(25)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">25. SMB Enum</button>
130
+ <button onclick="runPresetCommand(26)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">26. NFS Enum</button>
131
+ <button onclick="runPresetCommand(27)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">27. MySQL Brute</button>
132
+ <button onclick="runPresetCommand(28)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">28. MSSQL Brute</button>
133
+ <button onclick="runPresetCommand(29)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">29. Oracle Brute</button>
134
+ <button onclick="runPresetCommand(30)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">30. Postgres Brute</button>
135
+ <button onclick="runPresetCommand(31)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">31. Redis Brute</button>
136
+ <button onclick="runPresetCommand(32)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">32. MongoDB Brute</button>
137
+ <button onclick="runPresetCommand(33)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">33. Elastic Brute</button>
138
+ <button onclick="runPresetCommand(34)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">34. Jenkins Brute</button>
139
+ <button onclick="runPresetCommand(35)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">35. Docker Enum</button>
140
+ <button onclick="runPresetCommand(36)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">36. Kubernetes Enum</button>
141
+ <button onclick="runPresetCommand(37)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">37. AWS Enum</button>
142
+ <button onclick="runPresetCommand(38)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">38. Azure Enum</button>
143
+ <button onclick="runPresetCommand(39)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">39. GCP Enum</button>
144
+ <button onclick="runPresetCommand(40)" class="bg-gray-600 hover:bg-gray-500 text-xs p-1 rounded truncate">40. Metasploit</button>
145
+ </div>
146
+ </div>
147
+ </div>
148
+
149
+ <div class="text-xs text-gray-500 text-center">
150
+ Connected: <span class="text-green-400">localhost</span>
151
+ </div>
152
+ </div>
153
+
154
+ <!-- Terminal -->
155
+ <div class="flex-1 flex flex-col terminal-bg">
156
+ <div class="p-4 border-b border-gray-700 flex items-center">
157
+ <div class="flex-1">
158
+ <div class="text-sm font-medium">Terminal Session</div>
159
+ <div class="text-xs text-gray-500">Interactive hacking console</div>
160
+ </div>
161
+ <div class="flex space-x-2">
162
+ <button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
163
+ <i class="fas fa-cog text-gray-400 text-sm"></i>
164
+ </button>
165
+ <button class="bg-gray-700 hover:bg-gray-600 p-1 rounded">
166
+ <i class="fas fa-expand text-gray-400 text-sm"></i>
167
+ </button>
168
+ </div>
169
+ </div>
170
+
171
+ <div class="flex-1 p-4 overflow-y-auto scrollbar-hide command-history" id="terminal-output">
172
+ <div class="text-green-400 mb-4">
173
+ <div class="flex items-baseline">
174
+ <span class="text-purple-400 font-mono">hacktool-pro</span>
175
+ <span class="text-gray-500 mx-1">@</span>
176
+ <span class="text-yellow-400 font-mono">localhost</span>
177
+ <span class="text-gray-500 mx-1">~</span>
178
+ <span class="text-gray-500">$</span>
179
+ <span class="ml-2 typewriter" style="width: 350px;">Welcome to HackTool Pro v2.4.1 - Ethical Hacking Terminal</span>
180
+ </div>
181
+ </div>
182
+ <div class="text-gray-400 text-sm mb-4">
183
+ Type <span class="text-blue-400">help</span> to see available commands or click on preset commands from the sidebar.
184
+ </div>
185
+ <div class="text-gray-400 text-sm mb-4">
186
+ <div class="flex items-baseline">
187
+ <span class="text-purple-400 font-mono">hacktool-pro</span>
188
+ <span class="text-gray-500 mx-1">@</span>
189
+ <span class="text-yellow-400 font-mono">localhost</span>
190
+ <span class="text-gray-500 mx-1">~</span>
191
+ <span class="text-gray-500">$</span>
192
+ <span class="ml-2">Initializing system...</span>
193
+ </div>
194
+ <div class="ml-8 text-green-400">βœ“ Security protocols enabled</div>
195
+ <div class="ml-8 text-green-400">βœ“ Command modules loaded</div>
196
+ <div class="ml-8 text-green-400">βœ“ Network interfaces ready</div>
197
+ </div>
198
+ </div>
199
+
200
+ <div class="p-4 border-t border-gray-700">
201
+ <div class="flex items-center">
202
+ <span class="text-green-400 font-mono mr-2">$</span>
203
+ <input type="text" id="command-input" class="bg-transparent border-none outline-none flex-1 font-mono text-green-400" placeholder="Enter command..." autofocus>
204
+ <button class="ml-2 bg-blue-600 hover:bg-blue-700 px-3 py-1 rounded text-sm" onclick="executeCommand()">
205
+ Run
206
+ </button>
207
+ </div>
208
+ </div>
209
+ </div>
210
+ </div>
211
+
212
+ <!-- Status Bar -->
213
+ <div class="bg-gray-800 rounded-b-lg px-4 py-2 flex items-center justify-between text-xs">
214
+ <div class="text-gray-400">
215
+ <span class="text-green-400">Ready</span> | <span>CPU: 12%</span> | <span>MEM: 34%</span>
216
+ </div>
217
+ <div class="flex items-center space-x-4">
218
+ <div class="flex items-center text-gray-400">
219
+ <i class="fas fa-shield-alt mr-1 text-green-400"></i>
220
+ <span>Secure</span>
221
+ </div>
222
+ <div class="flex items-center text-gray-400">
223
+ <i class="fas fa-network-wired mr-1 text-blue-400"></i>
224
+ <span>192.168.1.105</span>
225
+ </div>
226
+ <div class="flex items-center text-gray-400">
227
+ <i class="fas fa-clock mr-1 text-yellow-400"></i>
228
+ <span id="current-time"></span>
229
+ </div>
230
+ </div>
231
+ </div>
232
+ </div>
233
+
234
+ <script>
235
+ // Update current time
236
+ function updateTime() {
237
+ const now = new Date();
238
+ document.getElementById('current-time').textContent = now.toLocaleTimeString();
239
+ }
240
+ setInterval(updateTime, 1000);
241
+ updateTime();
242
+
243
+ // Command history
244
+ let commandHistory = [];
245
+ let historyIndex = -1;
246
+
247
+ // Terminal functions
248
+ const terminalOutput = document.getElementById('terminal-output');
249
+ const commandInput = document.getElementById('command-input');
250
+
251
+ // Focus input on any click in the terminal
252
+ document.addEventListener('click', () => {
253
+ commandInput.focus();
254
+ });
255
+
256
+ // Handle command execution
257
+ function executeCommand() {
258
+ const command = commandInput.value.trim();
259
+ if (!command) return;
260
+
261
+ // Add to history
262
+ commandHistory.push(command);
263
+ historyIndex = commandHistory.length;
264
+
265
+ // Display command
266
+ addCommandToTerminal(command);
267
+
268
+ // Process command
269
+ processCommand(command);
270
+
271
+ // Clear input
272
+ commandInput.value = '';
273
+ }
274
+
275
+ // Handle Enter key
276
+ commandInput.addEventListener('keypress', (e) => {
277
+ if (e.key === 'Enter') {
278
+ executeCommand();
279
+ }
280
+ });
281
+
282
+ // Handle up/down arrows for history
283
+ commandInput.addEventListener('keydown', (e) => {
284
+ if (e.key === 'ArrowUp' && commandHistory.length > 0) {
285
+ e.preventDefault();
286
+ if (historyIndex > 0) historyIndex--;
287
+ commandInput.value = commandHistory[historyIndex] || '';
288
+ } else if (e.key === 'ArrowDown' && commandHistory.length > 0) {
289
+ e.preventDefault();
290
+ if (historyIndex < commandHistory.length - 1) historyIndex++;
291
+ commandInput.value = commandHistory[historyIndex] || '';
292
+ if (historyIndex === commandHistory.length - 1) {
293
+ commandInput.value = '';
294
+ historyIndex = commandHistory.length;
295
+ }
296
+ }
297
+ });
298
+
299
+ // Add command to terminal output
300
+ function addCommandToTerminal(command) {
301
+ const commandElement = document.createElement('div');
302
+ commandElement.className = 'text-green-400 mb-2';
303
+ commandElement.innerHTML = `
304
+ <div class="flex items-baseline">
305
+ <span class="text-purple-400 font-mono">hacktool-pro</span>
306
+ <span class="text-gray-500 mx-1">@</span>
307
+ <span class="text-yellow-400 font-mono">localhost</span>
308
+ <span class="text-gray-500 mx-1">~</span>
309
+ <span class="text-gray-500">$</span>
310
+ <span class="ml-2">${command}</span>
311
+ </div>
312
+ `;
313
+ terminalOutput.appendChild(commandElement);
314
+ terminalOutput.scrollTop = terminalOutput.scrollHeight;
315
+ }
316
+
317
+ // Add output to terminal
318
+ function addOutputToTerminal(output, isError = false) {
319
+ const outputElement = document.createElement('div');
320
+ outputElement.className = isError ? 'text-red-400 mb-4 font-mono text-sm' : 'text-gray-300 mb-4 font-mono text-sm';
321
+ outputElement.innerHTML = output;
322
+ terminalOutput.appendChild(outputElement);
323
+ terminalOutput.scrollTop = terminalOutput.scrollHeight;
324
+ }
325
+
326
+ // Process commands
327
+ function processCommand(command) {
328
+ const cmd = command.split(' ')[0].toLowerCase();
329
+ const args = command.split(' ').slice(1);
330
+
331
+ switch(cmd) {
332
+ case 'help':
333
+ showHelp();
334
+ break;
335
+ case 'clear':
336
+ terminalOutput.innerHTML = '';
337
+ break;
338
+ case 'scan':
339
+ runScan(args);
340
+ break;
341
+ case 'exploit':
342
+ runExploit(args);
343
+ break;
344
+ case 'crack':
345
+ runCrack(args);
346
+ break;
347
+ case 'brute':
348
+ runBrute(args);
349
+ break;
350
+ case 'sniff':
351
+ runSniff(args);
352
+ break;
353
+ case 'spoof':
354
+ runSpoof(args);
355
+ break;
356
+ case 'dos':
357
+ runDos(args);
358
+ break;
359
+ case 'mitm':
360
+ runMitm(args);
361
+ break;
362
+ case 'enum':
363
+ runEnum(args);
364
+ break;
365
+ case 'list':
366
+ showPresetCommands();
367
+ break;
368
+ default:
369
+ addOutputToTerminal(`Command not found: ${cmd}. Type 'help' for available commands.`, true);
370
+ }
371
+ }
372
+
373
+ // Show help
374
+ function showHelp() {
375
+ const helpText = `
376
+ <div class="mb-2 text-blue-400">Available Commands:</div>
377
+ <div class="grid grid-cols-2 gap-2 mb-2">
378
+ <div><span class="text-green-400">help</span> - Show this help message</div>
379
+ <div><span class="text-green-400">clear</span> - Clear the terminal</div>
380
+ <div><span class="text-green-400">scan</span> [target] - Run network scan</div>
381
+ <div><span class="text-green-400">exploit</span> [target] - Run exploit</div>
382
+ <div><span class="text-green-400">crack</span> [hash] - Crack password hash</div>
383
+ <div><span class="text-green-400">brute</span> [service] - Brute force attack</div>
384
+ <div><span class="text-green-400">sniff</span> [interface] - Packet sniffing</div>
385
+ <div><span class="text-green-400">spoof</span> [target] - ARP spoofing</div>
386
+ <div><span class="text-green-400">dos</span> [target] - Denial of Service</div>
387
+ <div><span class="text-green-400">mitm</span> [target] - Man in the Middle</div>
388
+ <div><span class="text-green-400">enum</span> [service] - Service enumeration</div>
389
+ <div><span class="text-green-400">list</span> - Show preset commands</div>
390
+ </div>
391
+ <div class="text-gray-500 text-xs">Use preset commands from sidebar for specific tools</div>
392
+ `;
393
+ addOutputToTerminal(helpText);
394
+ }
395
+
396
+ // Show preset commands
397
+ function showPresetCommands() {
398
+ let commands = `
399
+ <div class="mb-2 text-blue-400">Preset Commands (click in sidebar):</div>
400
+ <div class="grid grid-cols-2 gap-1 text-xs">
401
+ `;
402
+
403
+ for (let i = 1; i <= 40; i++) {
404
+ const cmdName = getPresetCommandName(i);
405
+ commands += `<div>${i}. ${cmdName}</div>`;
406
+ }
407
+
408
+ commands += `</div>`;
409
+ addOutputToTerminal(commands);
410
+ }
411
+
412
+ // Run preset command
413
+ function runPresetCommand(num) {
414
+ const cmdName = getPresetCommandName(num);
415
+ const cmd = getPresetCommand(num);
416
+
417
+ // Simulate typing
418
+ commandInput.value = cmd;
419
+
420
+ // Execute after a short delay
421
+ setTimeout(() => {
422
+ executeCommand();
423
+ }, 100);
424
+ }
425
+
426
+ // Get preset command name
427
+ function getPresetCommandName(num) {
428
+ const commands = [
429
+ "Port Scan", "Ping Sweep", "DNS Enum", "WHOIS Lookup", "Subdomain Brute",
430
+ "HTTP Header", "SSL Check", "SQL Injection", "XSS Test", "CSRF Test",
431
+ "Brute Force", "Hash Crack", "Wifi Scan", "ARP Spoof", "MAC Changer",
432
+ "Packet Sniff", "MITM Attack", "DOS Attack", "SSH Brute", "FTP Brute",
433
+ "RDP Brute", "SMTP Enum", "SNMP Walk", "LDAP Enum", "SMB Enum",
434
+ "NFS Enum", "MySQL Brute", "MSSQL Brute", "Oracle Brute", "Postgres Brute",
435
+ "Redis Brute", "MongoDB Brute", "Elastic Brute", "Jenkins Brute", "Docker Enum",
436
+ "Kubernetes Enum", "AWS Enum", "Azure Enum", "GCP Enum", "Metasploit"
437
+ ];
438
+ return commands[num - 1] || "Unknown Command";
439
+ }
440
+
441
+ // Get preset command
442
+ function getPresetCommand(num) {
443
+ const commands = [
444
+ "scan -p 1-1024", "scan -ping", "enum dns", "whois lookup", "scan -subdomains",
445
+ "scan -http", "scan -ssl", "exploit sql", "exploit xss", "exploit csrf",
446
+ "brute all", "crack md5", "scan -wifi", "spoof arp", "spoof mac",
447
+ "sniff eth0", "mitm start", "dos flood", "brute ssh", "brute ftp",
448
+ "brute rdp", "enum smtp", "enum snmp", "enum ldap", "enum smb",
449
+ "enum nfs", "brute mysql", "brute mssql", "brute oracle", "brute postgres",
450
+ "brute redis", "brute mongodb", "brute elastic", "brute jenkins", "enum docker",
451
+ "enum kubernetes", "enum aws", "enum azure", "enum gcp", "exploit msf"
452
+ ];
453
+ return commands[num - 1] || "help";
454
+ }
455
+
456
+ // Command functions
457
+ function runScan(args) {
458
+ let output = "<div class='text-yellow-400'>Starting scan...</div>";
459
+
460
+ if (args.includes('-p')) {
461
+ output += `
462
+ <div class='ml-4'>
463
+ <div>Scanning ports 1-1024 on target...</div>
464
+ <div class='text-green-400'>βœ“ Port 22 (SSH) open</div>
465
+ <div class='text-green-400'>βœ“ Port 80 (HTTP) open</div>
466
+ <div class='text-green-400'>βœ“ Port 443 (HTTPS) open</div>
467
+ <div class='text-gray-500'>βœ— Port 3389 (RDP) closed</div>
468
+ <div>Scan completed in 4.2 seconds</div>
469
+ </div>
470
+ `;
471
+ } else if (args.includes('-ping')) {
472
+ output += `
473
+ <div class='ml-4'>
474
+ <div>Pinging network range 192.168.1.1-254...</div>
475
+ <div class='text-green-400'>βœ“ 192.168.1.1 (Router) responding</div>
476
+ <div class='text-green-400'>βœ“ 192.168.1.105 (This machine)</div>
477
+ <div class='text-green-400'>βœ“ 192.168.1.120 (Unknown device)</div>
478
+ <div>5 hosts found in 8.7 seconds</div>
479
+ </div>
480
+ `;
481
+ } else if (args.includes('-wifi')) {
482
+ output += `
483
+ <div class='ml-4'>
484
+ <div>Scanning nearby WiFi networks...</div>
485
+ <div class='text-green-400'>βœ“ HomeWiFi (Signal: 85%, Security: WPA2)</div>
486
+ <div class='text-green-400'>βœ“ GuestNetwork (Signal: 60%, Security: Open)</div>
487
+ <div class='text-green-400'>βœ“ NeighborWiFi (Signal: 45%, Security: WPA3)</div>
488
+ <div>3 networks found</div>
489
+ </div>
490
+ `;
491
+ } else if (args.includes('-subdomains')) {
492
+ output += `
493
+ <div class='ml-4'>
494
+ <div>Brute-forcing subdomains for example.com...</div>
495
+ <div class='text-green-400'>βœ“ Found: www.example.com</div>
496
+ <div class='text-green-400'>βœ“ Found: mail.example.com</div>
497
+ <div class='text-green-400'>βœ“ Found: api.example.com</div>
498
+ <div class='text-green-400'>βœ“ Found: dev.example.com</div>
499
+ <div>4 subdomains discovered</div>
500
+ </div>
501
+ `;
502
+ } else if (args.includes('-http')) {
503
+ output += `
504
+ <div class='ml-4'>
505
+ <div>Fetching HTTP headers for target...</div>
506
+ <div>Server: Apache/2.4.41</div>
507
+ <div>X-Powered-By: PHP/7.4.3</div>
508
+ <div>Content-Type: text/html; charset=UTF-8</div>
509
+ <div>X-Frame-Options: SAMEORIGIN</div>
510
+ </div>
511
+ `;
512
+ } else if (args.includes('-ssl')) {
513
+ output += `
514
+ <div class='ml-4'>
515
+ <div>Checking SSL certificate...</div>
516
+ <div>Issuer: Let's Encrypt</div>
517
+ <div>Valid until: 2023-12-31</div>
518
+ <div>Signature Algorithm: SHA256-RSA</div>
519
+ <div class='text-yellow-400'>Warning: TLS 1.0 enabled</div>
520
+ </div>
521
+ `;
522
+ } else {
523
+ output = "<div class='text-red-400'>Invalid scan type. Use 'scan -p' for port scan, 'scan -ping' for ping sweep, etc.</div>";
524
+ }
525
+
526
+ addOutputToTerminal(output);
527
+ }
528
+
529
+ function runExploit(args) {
530
+ let output = "<div class='text-yellow-400'>Preparing exploit...</div>";
531
+
532
+ if (args.includes('sql')) {
533
+ output += `
534
+ <div class='ml-4'>
535
+ <div>Testing for SQL injection vulnerabilities...</div>
536
+ <div class='text-green-400'>βœ“ Vulnerable parameter found: 'id'</div>
537
+ <div>Attempting UNION-based injection...</div>
538
+ <div class='text-green-400'>βœ“ Success! Database version: MySQL 5.7.32</div>
539
+ <div>Dumping database names:</div>
540
+ <div class='ml-4'>- information_schema</div>
541
+ <div class='ml-4'>- website_db</div>
542
+ <div class='ml-4'>- users_db</div>
543
+ </div>
544
+ `;
545
+ } else if (args.includes('xss')) {
546
+ output += `
547
+ <div class='ml-4'>
548
+ <div>Testing for XSS vulnerabilities...</div>
549
+ <div class='text-green-400'>βœ“ Reflected XSS found in search parameter</div>
550
+ <div class='text-green-400'>βœ“ Stored XSS found in comment form</div>
551
+ <div>Example payload: &lt;script&gt;alert(1)&lt;/script&gt;</div>
552
+ </div>
553
+ `;
554
+ } else if (args.includes('csrf')) {
555
+ output += `
556
+ <div class='ml-4'>
557
+ <div>Testing for CSRF vulnerabilities...</div>
558
+ <div class='text-green-400'>βœ“ No CSRF token found in password change form</div>
559
+ <div>Vulnerable to CSRF attacks</div>
560
+ </div>
561
+ `;
562
+ } else if (args.includes('msf')) {
563
+ output += `
564
+ <div class='ml-4'>
565
+ <div>Starting Metasploit framework...</div>
566
+ <div>msf6 > use exploit/multi/handler</div>
567
+ <div>msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp</div>
568
+ <div>msf6 exploit(multi/handler) > set LHOST 192.168.1.105</div>
569
+ <div>msf6 exploit(multi/handler) > set LPORT 4444</div>
570
+ <div>msf6 exploit(multi/handler) > exploit</div>
571
+ <div class='text-green-400'>[*] Started reverse TCP handler on 192.168.1.105:4444</div>
572
+ </div>
573
+ `;
574
+ } else {
575
+ output = "<div class='text-red-400'>Invalid exploit type. Use 'exploit sql', 'exploit xss', etc.</div>";
576
+ }
577
+
578
+ addOutputToTerminal(output);
579
+ }
580
+
581
+ function runCrack(args) {
582
+ let output = "<div class='text-yellow-400'>Starting hash cracking...</div>";
583
+
584
+ if (args.includes('md5')) {
585
+ output += `
586
+ <div class='ml-4'>
587
+ <div>Hash: 5f4dcc3b5aa765d61d8327deb882cf99</div>
588
+ <div>Using rockyou.txt wordlist...</div>
589
+ <div class='text-green-400'>βœ“ Cracked: password (0.4 seconds)</div>
590
+ </div>
591
+ `;
592
+ } else {
593
+ output = "<div class='text-red-400'>Invalid hash type. Use 'crack md5' for MD5 hashes.</div>";
594
+ }
595
+
596
+ addOutputToTerminal(output);
597
+ }
598
+
599
+ function runBrute(args) {
600
+ let output = "<div class='text-yellow-400'>Preparing brute force attack...</div>";
601
+
602
+ if (args.includes('ssh')) {
603
+ output += `
604
+ <div class='ml-4'>
605
+ <div>Target: SSH (192.168.1.120:22)</div>
606
+ <div>Username list: top-usernames.txt</div>
607
+ <div>Password list: rockyou.txt</div>
608
+ <div>Starting attack...</div>
609
+ <div class='text-green-400'>βœ“ Found credentials: admin:admin123</div>
610
+ <div>Time elapsed: 12 minutes</div>
611
+ </div>
612
+ `;
613
+ } else if (args.includes('ftp')) {
614
+ output += `
615
+ <div class='ml-4'>
616
+ <div>Target: FTP (192.168.1.120:21)</div>
617
+ <div>Username list: common-ftp-users.txt</div>
618
+ <div>Password list: rockyou.txt</div>
619
+ <div>Starting attack...</div>
620
+ <div class='text-green-400'>βœ“ Found credentials: ftpuser:ftp123</div>
621
+ <div>Time elapsed: 8 minutes</div>
622
+ </div>
623
+ `;
624
+ } else if (args.includes('all')) {
625
+ output += `
626
+ <div class='ml-4'>
627
+ <div>Running multi-service brute force...</div>
628
+ <div class='text-green-400'>βœ“ SSH: admin:admin123</div>
629
+ <div class='text-green-400'>βœ“ FTP: ftpuser:ftp123</div>
630
+ <div class='text-red-400'>βœ— RDP: No valid credentials</div>
631
+ <div>Completed in 25 minutes</div>
632
+ </div>
633
+ `;
634
+ } else {
635
+ output = "<div class='text-red-400'>Invalid service. Use 'brute ssh', 'brute ftp', etc.</div>";
636
+ }
637
+
638
+ addOutputToTerminal(output);
639
+ }
640
+
641
+ function runSniff(args) {
642
+ let output = "<div class='text-yellow-400'>Starting packet sniffing...</div>";
643
+
644
+ if (args.includes('eth0') || args.includes('start')) {
645
+ output += `
646
+ <div class='ml-4'>
647
+ <div>Interface: eth0</div>
648
+ <div>Filter: tcp port 80</div>
649
+ <div>Capturing packets (Ctrl+C to stop)...</div>
650
+ <div class='text-xs font-mono mt-2'>
651
+ <div>192.168.1.105:52341 -> 142.250.190.46:80 [GET / HTTP/1.1]</div>
652
+ <div>192.168.1.105:52342 -> 151.101.1.69:80 [GET /static/logo.png HTTP/1.1]</div>
653
+ <div>192.168.1.120:52343 -> 192.168.1.105:80 [POST /login HTTP/1.1]</div>
654
+ <div>... capturing more packets ...</div>
655
+ </div>
656
+ </div>
657
+ `;
658
+ } else {
659
+ output = "<div class='text-red-400'>Invalid interface. Use 'sniff eth0'.</div>";
660
+ }
661
+
662
+ addOutputToTerminal(output);
663
+ }
664
+
665
+ function runSpoof(args) {
666
+ let output = "<div class='text-yellow-400'>Preparing spoofing attack...</div>";
667
+
668
+ if (args.includes('arp')) {
669
+ output += `
670
+ <div class='ml-4'>
671
+ <div>Target: 192.168.1.120</div>
672
+ <div>Gateway: 192.168.1.1</div>
673
+ <div>Starting ARP spoofing...</div>
674
+ <div class='text-green-400'>βœ“ Poisoning ARP tables</div>
675
+ <div>Redirecting traffic through this machine</div>
676
+ <div class='text-yellow-400'>Warning: This will disrupt network connectivity</div>
677
+ </div>
678
+ `;
679
+ } else if (args.includes('mac')) {
680
+ output += `
681
+ <div class='ml-4'>
682
+ <div>Interface: eth0</div>
683
+ <div>Current MAC: 00:1A:2B:3C:4D:5E</div>
684
+ <div>Changing to random MAC address...</div>
685
+ <div class='text-green-400'>βœ“ New MAC: 12:34:56:78:90:AB</div>
686
+ </div>
687
+ `;
688
+ } else {
689
+ output = "<div class='text-red-400'>Invalid spoof type. Use 'spoof arp' or 'spoof mac'.</div>";
690
+ }
691
+
692
+ addOutputToTerminal(output);
693
+ }
694
+
695
+ function runDos(args) {
696
+ let output = "<div class='text-yellow-400'>Preparing DoS attack...</div>";
697
+
698
+ if (args.includes('flood')) {
699
+ output += `
700
+ <div class='ml-4'>
701
+ <div>Target: 192.168.1.120:80</div>
702
+ <div>Attack type: SYN Flood</div>
703
+ <div>Starting attack with 1000 packets/second...</div>
704
+ <div class='text-green-400'>βœ“ Target response slowing down</div>
705
+ <div class='text-green-400'>βœ“ Target service unavailable</div>
706
+ <div class='text-yellow-400'>Warning: This is illegal without permission</div>
707
+ </div>
708
+ `;
709
+ } else {
710
+ output = "<div class='text-red-400'>Invalid DoS type. Use 'dos flood'.</div>";
711
+ }
712
+
713
+ addOutputToTerminal(output);
714
+ }
715
+
716
+ function runMitm(args) {
717
+ let output = "<div class='text-yellow-400'>Preparing MITM attack...</div>";
718
+
719
+ if (args.includes('start')) {
720
+ output += `
721
+ <div class='ml-4'>
722
+ <div>Target: 192.168.1.120</div>
723
+ <div>Gateway: 192.168.1.1</div>
724
+ <div>Starting ARP poisoning...</div>
725
+ <div class='text-green-400'>βœ“ Traffic redirected</div>
726
+ <div>Starting SSLstrip...</div>
727
+ <div class='text-green-400'>βœ“ Capturing plaintext credentials</div>
728
+ <div>Starting packet inspection...</div>
729
+ <div class='text-xs font-mono mt-2'>
730
+ <div>[HTTP] username: johndoe, password: s3cr3t</div>
731
+ <div>[COOKIE] sessionid: a1b2c3d4e5f6</div>
732
+ <div>... capturing more data ...</div>
733
+ </div>
734
+ </div>
735
+ `;
736
+ } else {
737
+ output = "<div class='text-red-400'>Invalid command. Use 'mitm start'.</div>";
738
+ }
739
+
740
+ addOutputToTerminal(output);
741
+ }
742
+
743
+ function runEnum(args) {
744
+ let output = "<div class='text-yellow-400'>Starting enumeration...</div>";
745
+
746
+ if (args.includes('dns')) {
747
+ output += `
748
+ <div class='ml-4'>
749
+ <div>Target: example.com</div>
750
+ <div>Performing DNS enumeration...</div>
751
+ <div class='text-green-400'>βœ“ A record: 93.184.216.34</div>
752
+ <div class='text-green-400'>βœ“ MX records: mail.example.com</div>
753
+ <div class='text-green-400'>βœ“ TXT records: "v=spf1 include:_spf.example.com ~all"</div>
754
+ <div>DNS enumeration complete</div>
755
+ </div>
756
+ `;
757
+ } else if (args.includes('smtp')) {
758
+ output += `
759
+ <div class='ml-4'>
760
+ <div>Target: mail.example.com:25</div>
761
+ <div>Enumerating SMTP users...</div>
762
+ <div class='text-green-400'>βœ“ Valid user: admin@example.com</div>
763
+ <div class='text-green-400'>βœ“ Valid user: support@example.com</div>
764
+ <div class='text-red-400'>βœ— Invalid user: root@example.com</div>
765
+ <div>Found 2 valid email addresses</div>
766
+ </div>
767
+ `;
768
+ } else if (args.includes('snmp')) {
769
+ output += `
770
+ <div class='ml-4'>
771
+ <div>Target: 192.168.1.120</div>
772
+ <div>Community string: public</div>
773
+ <div>Walking SNMP tree...</div>
774
+ <div class='text-green-400'>βœ“ System: Cisco Router</div>
775
+ <div class='text-green-400'>βœ“ Uptime: 14 days, 6 hours</div>
776
+ <div class='text-green-400'>βœ“ Interfaces: 4</div>
777
+ <div>SNMP enumeration complete</div>
778
+ </div>
779
+ `;
780
+ } else {
781
+ output = "<div class='text-red-400'>Invalid service. Use 'enum dns', 'enum smtp', etc.</div>";
782
+ }
783
+
784
+ addOutputToTerminal(output);
785
+ }
786
+ </script>
787
+ <p style="border-radius: 8px; text-align: center; font-size: 12px; color: #fff; margin-top: 16px;position: fixed; left: 8px; bottom: 8px; z-index: 10; background: rgba(0, 0, 0, 0.8); padding: 4px 8px;">Made with <img src="https://enzostvs-deepsite.hf.space/logo.svg" alt="DeepSite Logo" style="width: 16px; height: 16px; vertical-align: middle;display:inline-block;margin-right:3px;filter:brightness(0) invert(1);"><a href="https://enzostvs-deepsite.hf.space" style="color: #fff;text-decoration: underline;" target="_blank" >DeepSite</a> - 🧬 <a href="https://enzostvs-deepsite.hf.space?remix=ash-coded-it/hacktool" style="color: #fff;text-decoration: underline;" target="_blank" >Remix</a></p></body>
788
+ </html>
prompts.txt ADDED
File without changes