A practical and optimal library for those interested in Pentest, cryptography,Vulnerability Scanner and ..
Project description
Unsafe (Advanced Pentesting Module)
An Advanced Module for Penetration Testing. Using This Module, You Can Implement Brute Force Operations and Identification and Anonymity. This Module is Always Being Developed and There is No Need to Worry About it Becoming Unavailable.
-
Author : Ahur4
-
Maintainer : MesutFD
-
- 𝗘 𝗫 𝗣 𝗟 𝗢 𝗜 𝗧 : Telegram Channel
Features
- Encrypt and Decrypt Hashs and Encodes
- Collecting Proxies and Check Their Health
- BruteForcing Part for Find Admin Panel or FileManager or CloudFlare Bypassing ...
- Show, Delete and Edit Exif Metadata of Image
- All the operations that can be done on WordPress are placed in this section
- Measures to Remain Anonymous
- Search in Browsers(google_dorking or ...)
Usage
-
Encrypt and Decrypt Hashs and Encodes
-
Available Methods:
( md5 | sha1 | sha224 | sha256 | sha384 | sha512 | sha3-224 | sha3-256
sha3-384 | sha3-512 | shake128 | shake256 | base16 | base32 | base64
base85 | ascii85 | caesar ) -
Encryption Usage :
from unsafe import Unsafe unsafe = Unsafe() name = "Ahur4" md5_name = unsafe.text_encrypt(name) #Default hash_method is "md5" print(md5_name) #Output : 'ada3e80e34da70c99c1acff7f492993c' base64_name = unsafe.text_encrypt(name, hash_method="base64") print(base64_name) #Output : b'QWh1cjQ=' caesar_name = unsafe.text_encrypt(name, hash_method="caesar", count=5) print(caesar_name) #Output : 'Fmzw4' shake128_name = unsafe.text_encrypt(name, encode='UTF-8', hash_method="shake128", count=15) print(shake128_name) #Output : ''c8a3ab8ca74720d227550f4f76b71f''
- Decryption Usage :
from unsafe import Unsafe unsafe = Unsafe() hash = "ada3e80e34da70c99c1acff7f492993c" #Md5 - Value : Ahur4 name = unsafe.text_decrypt(hash=hash, word="Ahur4") #Default hash_method is "md5" print(name) #Output : True # When Do Not Have any Word or Wordlist Default Wordlist is John The Ripper Wordlist name = unsafe.text_decrypt(hash=hash, hash_method="sha1") print(name) #Output : '' ,Cause Not Found Result.
-
-
Collecting Proxies and Check Their Health.
-
Available Protocols :
(http | socks4 | socks5)
-
Proxy Wrapper Usage
from unsafe import Unsafe unsafe = Unsafe() proxies = unsafe.proxy_wrapper(protocol="http", max_ping=200) print(proxies) # Output : {'ip':'port', 'ip':'port', ...}
- Proxy Checker Usage
from unsafe import Unsafe unsafe = Unsafe() isActive = unsafe.proxy_checker(proxy_host='127.0.0.1', proxy_port='80', protocol='http', timeout=10) print(isActive) # Output : True|False
-
-
BruteForcing Part for Find Admin Panel or FileManager or CloudFlare Bypassing ...
- AdminFinder Usage
from unsafe import Unsafe unsafe = Unsafe() admin_panels = unsafe.admin_finder(domain='example.com', workers=5, #Threads timeout=10, ext='php', #Site type user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)", proxy="http://127.0.0.1:80" ) print(admin_panels) # Output : ['http://example.com/wp-login.php']
- FileManager Finder Usage
from unsafe import Unsafe unsafe = Unsafe() filemanagers = unsafe.filemanager_finder(domain='example.com', workers=5, #Threads timeout=10, user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)", proxy="http://127.0.0.1:80" ) print(filemanagers) # Output : ['https://example.com/filemanager/', 'https://example.com/filemanager/index.php']
- CloudFlare Bypassing Usage
from unsafe import Unsafe unsafe = Unsafe() realip = unsafe.cloudflare_bypasser(domain='google.com', workers=5, #Threads ) print(realip) # Output : {'ns4.google.com': '216.239.38.10', 'search.google.com': '142.251.39.14', ....}
-
Show, Delete and Edit Exif Metadata of Image.
- Delete Metadata Usage
from unsafe import Unsafe unsafe = Unsafe() isDeleted = unsafe.delete_exif_img('/path/of/file.jpg') print(isDeleted) # Output : True|False
- Edit Metadata Usage
from unsafe import Unsafe unsafe = Unsafe() isEdited = unsafe.edit_exif_img('/path/of/file.jpg',key='model', value='unsafe') print(isEdited) # Output : True|False
- Extract Metadata Usage
from unsafe import Unsafe unsafe = Unsafe() Exifed = unsafe.extract_exif_img('/path/of/file.jpg') print(Exifed) # Output : {"make": "huawei", "model": "G-750", ...}
-
All the operations that can be done on WordPress are placed in this section.
- Extract Admin Users
from unsafe import Unsafe unsafe = Unsafe() site_users = unsafe.wp_get_users(domain="wordpress.org") print(site_users) # Output : ['admin', 'administrator']
- Plugin Scanner
from unsafe import Unsafe unsafe = Unsafe() site_users = unsafe.wp_plugin_scanner(domain="wordpress.org", timeout=10, workers=5, proxy="http://127.0.0.1:80" ) print(site_users) # Output : ['http://wordpress.org/wp-content/plugins/wordpress-seo/',....]
-
Measures to Remain Anonymous
- Detect and Cover Faces
from unsafe import Unsafe unsafe = Unsafe() result_path = unsafe.anon_picture(image_path="path/of/image.jpg") print(result_path) # Output : 'anon_picture_cache/UPW5X51.jpg'
-
Search in Browsers(google_dorking or ...)
- Google Dorking
from unsafe import Unsafe unsafe = Unsafe() # Search a Username in Insatgram result = unsafe.google_dorking(query='"username" site:insatgram.com') print(result) # Output : ['https://instagram.com/username', ....]
New Features : Coming Soon...
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.