The Linux evil toolkit is a framework that aims to compile and use a variety of security tools for security system analysts.
LETK (Linux evil toolkit) has a few simple commands, one of which is INIT, which allows you to set a goal and thus use all the tools, without having to type anything else.
Use
Basics
|exit | Close this script |
|
|clear | Clear terminal |
|
|Update | Update Linux evil toolkit |
|
|train | Show train in terminal, tuutuu |
|
|INIT | Setup global variables |
|
|reset | Clear terminal and reset global variables |
|
|cover | Cover your tracks on your computer |
|
|simple_map | This command execute automap (auto namap) |
|
|search | Search email, whois and banner grep |
|
|status | Show machine status |
|
|dnsscanner | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA' |
|
|dirscanner | Scan files and folders |
|
|banner | Show Linux evil Toolkit banner in terminal |
|
|webdns | Show Web Sites for dns scanner |
|
|linuxfiles | Show important linux files |
|
|linuxfolders | Show important linux folders |
|
|windowsfolders | Show important windows folders |
|
|linuxutil | Show useful commands in linux |
|
|test tanks | For development only |
simple_scan options
alone |
|
|
|
"-sL" --> "List Scan - simply list targets to scan" |
|
"-sP" --> "Ping Scan - go no further than determining if host is online" |
|
|
|
default |
|
|
|
"-sS -sV" --> "TCP SYN" |
|
"-sU -sV" --> "UDP Scan" |
|
|
|
icmp_echo |
|
|
|
"-sS -sV -PE" --> "TCP SYN + ICMP echo discovery probes" |
|
"-sU -sV -PE" --> "UDP Scan + ICMP echo discovery probes" |
|
"-sA -sV -PE" --> "ACK + ICMP echo discovery probes" |
|
|
|
port_list |
|
|
|
"-sS" --> "TCP SYN + [portlist]: TCP SYN discovery probes to given ports" |
|
"-sA" --> "ACK + [portlist]: TCP ACK discovery probes to given ports" |
|
"-sU" --> "UDP Scan + [portlist]: TCP UDP discovery probes to given ports" |
|
|
|
special |
|
|
|
"-sT -sV" --> "Connect ()" |
|
"-sW -sV" --> "Window" |
|
"-sM -sV" --> "Maimon scans" |
|
"-sN -sV" --> "TCP Null" |
|
"-sF -sV" --> "FIN" |
|
"-sX -sV" --> "Xmas scans" |
DeepLink
DeepLink is a deepweb (tor onion domain) database for your test and explore "deep web" for fun |
|
|
|
usage: type deeplink and type option |
|
--website | Cat best site for your learn about deepweb |
|
--darklinks | show dark-net links |
|
--onionlinks | show more 500 deep web links |
|
--onionlinks-active | show more links, but active links only |
|
--searchlinks | show tor search (google-like) |
|
--toralt | show tor alternatives (i2-, freenet, etc) |
Backend Functions
From engine module
Engine.INIT() | Setup variables |
|
Engine.sys("ls") | Test Function |
|
Engine.R() | Reset variables |
|
Engine.cover() | Cover bash history |
|
Engine.compress() | Compress files |
|
Engine.port_scanner() | Repleced by automap |
|
Engine.search() | Search whois, emails, banner grep |
|
Engine.status() | Show machine status |
|
Engine.dns_scanner() | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA' |
|
Emgine.dir_scanner() | Brute force for search files and folders |
|
Engine.simple_scan() | Execute automap |
|
Engine.assembly() | Backend function |
|
Engine.exec() | Backend function |
From Visual module
Visual.banner() | Function for show text |
|
Visual.web_dns() | Function for show text |
|
Visual.linux_files() | Function for show text |
|
Visual.linux_folders() | Function for show text |
|
Visual.linux_util() | Function for show text |
Interpreter Module
Interpreter.to interpret() | Backend function |
|
Interpreter.main() | Backend function |
ERROR CODES & COLORS
prGreen() | Succesful |
|
prRed() | Error |
|
Other[Cyan, yellow] | Execution error |
You can download the program from here.
Read them Technology News from all over the world, with the validity of iGuRu.gr
Follow us on Google News
Comment Policy:
IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators