The Linux evil toolkit is a framework that aims to compile and use a variety of security tools for security system analysts.
LETK (Linux evil toolkit) has a few simple commands, one of which is INIT, which allows you to set a goal and thus use all the tools, without having to type anything else.
Use
Basics
|exit | Close this script |clear | Clear terminal |update | Update Linux evil toolkit |train | Show train in terminal, tuutuu |INIT | Setup global variables |reset | Clear terminal and reset global variables |cover | Cover your tracks on your computer |simple_map | This command execute automap (auto namap) |search | Search email, whois and banner grep |status | Show machine status |dnsscanner | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA' |dirscanner | Scan files and folders |banner | Show Linux evil Toolkit banner in terminal |webdns | Show Web Sites for dns scanner |linuxfiles | Show important linux files |linuxfolders | Show important linux folders |windowsfolders | Show important windows folders |linuxutil | Show useful commands in linux | test | For development only
simple_scan options
alone "-sL" --> "List Scan - simply list targets to scan" "-sP" --> "Ping Scan - go no further than determining if host is online" default "-sS -sV" --> " TCP SYN" "-sU -sV" --> "UDP Scan" icmp_echo "-sS -sV -PE" --> "TCP SYN + ICMP echo discovery probes" "-sU -sV -PE" --> "UDP Scan + ICMP echo discovery probes" "-sA -sV -PE" --> "ACK + ICMP echo discovery probes" port_list "-sS" --> "TCP SYN + [portlist]: TCP SYN discovery probes to given ports" "-sA" --> "ACK + [portlist]: TCP ACK discovery probes to given ports" "-sU" --> "UDP Scan + [portlist]: TCP UDP discovery probes to given ports" special "-sT -sV" --> "Connect()" "-sW -sV" --> "Window" "-sM -sV" --> "Maimon scans" "-sN -sV" --> "TCP Null" "-sF -sV" --> "FIN" "-sX -sV" --> "Xmas scans"
Deep Link
DeepLink is a deepweb (tor onion domain) database for your test and explore "deep web" for fun usage: type deeplink and type option --site | Cat best site for your learn about deepweb --darklinks | show dark-net links --onionlinks | show more 500 deep web links --onionlinks-active | show more links , but active links only --searchlinks | show tor search (google-like) --toralt | show tor alternatives (i2-, freenet, etc)
Backend Functions
From engine module
Engine.INIT () | Setup variables Engine.sys ("ls") | Test Function Engine.R () | Reset variables Engine.cover () | Cover bash history Engine.compress () | Compress files Engine.port_scanner () | Repleced by automap Engine.search () | Search whois, emails, banner grep Engine.status () | Show machine status Engine.dns_scanner () | Scan for 'A', 'AAAA', 'CNAME', 'MX', 'NS', 'PTR', 'SOA' Emgine.dir_scanner () | Brute force for search files and folders Engine.simple_scan () | Execute automap Engine.assembly () | Backend function Engine.exec () | Backend function
From Visual module
Visual.banner () | Function for show text Visual.web_dns () | Function for show text Visual.linux_files () | Function for show text Visual.linux_folders () | Function for show text Visual.linux_util () | Function for show text
Interpreter Module
Interpreter.interpreter () | Backend function Interpreter.main () | Backend function
ERROR CODES & COLORS
prGreen () | Succesful prRed () | Error Other [Cyan, yellow] | Execution error
You can download the program from here.