Skip to main content

A practical and optimal library for those interested in Pentest, cryptography,Vulnerability Scanner and ..

Project description

PyPI Total PyPi Downloads Monthly PyPi Downloads Weekly PyPi Downloads GitHub repo size PyPI - License Telegram-Channel

Unsafe (Advanced Penetration Testing Module)

An Advanced Module for Penetration Testing. Using This Module, You Can Implement Brute Force Operations and Identification and Anonymity. This Module is Always Being Developed and There is No Need to Worry About it Becoming Unavailable.

  • Author : Ahur4
  • Maintainer : MesutFD

Features

Usage

  • Encryption & Decryption

    • Available Methods:

      ( md5 | sha1 | sha224 | sha256 | sha384 | sha512 | sha3-224 | sha3-256
      sha3-384 | sha3-512 | shake128 | shake256 | base16 | base32 | base64
      base85 | ascii85 | caesar )

    • Encryption Usage :

        from unsafe import Unsafe
        unsafe = Unsafe()
    
        name = "Ahur4"
    
        md5_name = unsafe.text_encrypt(name) #Default hash_method is "md5"
        print(md5_name) #Output : 'ada3e80e34da70c99c1acff7f492993c'
    
        base64_name = unsafe.text_encrypt(name, hash_method="base64")
        print(base64_name) #Output : b'QWh1cjQ='
    
        caesar_name = unsafe.text_encrypt(name, hash_method="caesar", count=5)
        print(caesar_name) #Output : 'Fmzw4'
    
        shake128_name = unsafe.text_encrypt(name, encode='UTF-8', hash_method="shake128", count=15)
        print(shake128_name) #Output : ''c8a3ab8ca74720d227550f4f76b71f''
    
    • Decryption Usage :
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        hash = "ada3e80e34da70c99c1acff7f492993c" #Md5 - Value : Ahur4
    
        name = unsafe.text_decrypt(hash=hash, word="Ahur4") #Default hash_method is "md5"
        print(name) #Output : True
    
        # When Do Not Have any Word or Wordlist Default Wordlist is John The Ripper Wordlist
        name = unsafe.text_decrypt(hash=hash, hash_method="sha1")
        print(name) #Output : '' ,Cause Not Found Result.
    

  • Proxy

    • Available Protocols :

      (http | socks4 | socks5)

    • Proxy Wrapper Usage

        from unsafe import Unsafe
        unsafe = Unsafe()
    
        proxies = unsafe.proxy_wrapper(protocol="http", max_ping=200)
        print(proxies) # Output : {'ip':'port', 'ip':'port', ...}
    
    • Proxy Checker Usage
        isActive = unsafe.proxy_checker(proxy_host='127.0.0.1', proxy_port='80', protocol='http', timeout=10)
        print(isActive) # Output : True|False
    

  • BruteForce

    • AdminFinder Usage
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        admin_panels = unsafe.admin_finder(domain='example.com',
                                           workers=5, #Threads
                                           timeout=10,
                                           ext='php', #Site type
                                           user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)",
                                           proxy="http://127.0.0.1:80"
                                        )
        print(admin_panels) # Output : ['http://example.com/wp-login.php']
    
    • FileManager Finder Usage
        filemanagers = unsafe.filemanager_finder(domain='example.com',
                                           workers=5, #Threads
                                           timeout=10,
                                           user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)",
                                           proxy="http://127.0.0.1:80"
                                        )
        print(filemanagers) # Output : ['https://example.com/filemanager/', 'https://example.com/filemanager/index.php']
    
    • CloudFlare Bypassing Usage
        realip = unsafe.cloudflare_bypasser(domain='google.com',
                                           workers=5, #Threads
                                        )
        print(realip) # Output : {'ns4.google.com': '216.239.38.10', 'search.google.com': '142.251.39.14', ....}
    
    • SubDomain Finder
        result = unsafe.subdomain_scanner(
            domain="google.com",
            workers=5,
            subdomains=["ww1", "forum", "download", "product", "search", "cdn", "ns1"], #Also this part have a default subdomains list.
            timeout=5,
            proxy="http://127.0.0.1:80"
            )
        print(result) # Output : ["ww1.google.com", ...]
    

  • Forensic.

    • Delete Image Metadata Usage
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        isDeleted = unsafe.delete_exif_img(path='/path/of/file.jpg')
        print(isDeleted) # Output : True|False
    
    • Edit Image Metadata Usage
        isEdited = unsafe.edit_exif_img(path='/path/of/file.jpg',key='model', value='unsafe')
        print(isEdited) # Output : True|False
    
    • Extract Image Metadata Usage
        Exifed = unsafe.extract_exif_img(path='/path/of/file.jpg')
        print(Exifed) # Output : {"make": "huawei", "model": "G-750", ...}
    
    • Delete PDF Metadata Usage
        result = unsafe.remove_pdf_metadata(filename="path/of/file.pdf")
        print(result) # Output : 'path/of/output.pdf'
    
    • Edit PDF Metadata Usage
        result = unsafe.edit_pdf_metadata(filename="path/of/file.pdf", metadata={"unsafe":"module"})
        print(result) # Output : 'path/of/output.pdf'
    
    • Extract PDF Metadata Usage
        result = unsafe.get_pdf_metadata(filename="path/of/file.pdf")
        print(result) # Output : {"/data":"values",...}
    
    • Delete Audio Metadata Usage
        result = unsafe.remove_audio_metadata(filename="path/of/file.mp3")
        print(result) # Output : 'path/of/output.mp3'
    
    • Edit Audio Metadata Usage
        result = unsafe.edit_audio_metadata(filename="path/of/file.mp3", metadata={"artist": "Ahur4"})
        print(result) # Output : 'path/of/output.mp3'
    
    • Extract Audio Metadata Usage
        result = unsafe.get_audio_metadata(filename="path/of/file.mp3")
        print(result) # Output : # Output : {"/data":"values",...}
    

  • Wordpress.

    • Extract Admin Users
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        site_users = unsafe.wp_get_users(domain="wordpress.org")
        print(site_users) # Output : ['admin', 'administrator']
    
    • Plugin Scanner
        site_users = unsafe.wp_plugin_scanner(domain="wordpress.org",
                                              timeout=10,
                                              workers=5,
                                              proxy="http://127.0.0.1:80"
                                            )
        print(site_users) # Output : ['http://wordpress.org/wp-content/plugins/wordpress-seo/',....]
    

  • VulnerabilityScanner

    • Xss Vulnerability Scanner
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        result = unsafe.xss_scanner(url="https://example.com/news.php", js_script="<Script>alert('hi')</scripT>")
        print(result) # Output : {"is_vulnerable": is_vulnerable, "form_detail": form_details}
    
    • SqlInjection Vulnerability Scanner
        result = unsafe.sql_injection_scanner(url="https://example.com/news.php?id=475433")
        print(result) # Output : ["https://example.com/news.php?id=245", "......", ..]
    

  • Crawling.

    • Crawling a single Page and Extract Usernames, Phones, Emails and ...
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        result = unsafe.crawl_single_page(url="https://example.com/contact.php", timeout=5, proxy="http://127.0.0.1:80")
        print(result) #Output : {"links": [...], "phones": [...], ...}
    
    • Search in Three Search Engines: Google, Bing and Ask
        # Search a Username in Insatgram
        result = unsafe.browser_search(query='"username" site:insatgram.com', timeout=10, proxy="http://127.0.0.1:80")
        print(result) # Output : ['https://instagram.com/username', ....]
    
    • Scan Entered Page and Detect Xss Vulnerability.
        result = unsafe.xss_scanner(url="https://xsslabs.com/xss-labs-1.php", js_script="<Script>alert('hi')</scripT>")
        print(result) # Output : {'is_vulnerable': True, 'form_detail': {'action': '#', 'method': 'get', 'inputs': [{'type': 'text', 'name': 'name', 'value': "<Script>alert('hi')</scripT>"}]}}
    

  • Network

    • Scan Open Ports.
        from unsafe import Unsafe
        unsafe = Unsafe()
    
        result = unsafe.port_scanner(host="127.0.0.1", ports=[80, 53, 443, 127])
        print(result) # Output : [80, 443]
    
    • Mac Address Lookup(find owner of device company)
        result = unsafe.mac_address_lookup(mac="00:00:5e:00:53:af")
        print(result) #Output : "U.S. Department of Defense (IANA)"
    

New Features : Coming Soon...

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

unsafe-1.2.50.tar.gz (407.3 kB view hashes)

Uploaded Source

Built Distribution

unsafe-1.2.50-py3-none-any.whl (421.8 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page