-
Notifications
You must be signed in to change notification settings - Fork 27
/
banner.py
82 lines (66 loc) · 3.4 KB
/
banner.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# -*- coding: utf-8 -*-
from method.function import col as color
import random
# 随机获取banner
import prettytable
banner_1 = color(r"""
_____ __ ____
/ ___/__ __/ /___ __________ / __ )____ _ __
\__ \/ / / / __/ / / / ___/ _ \ / __ / __ \| |/_/
___/ / /_/ / /_/ /_/ / / / __/ / /_/ / /_/ /> <
/____/\__,_/\__/\__,_/_/ \___/ /_____/\____/_/|_|
""","yellow")
banner_2 = color(r'''
____ __ ___
/ __/_ __/ /___ _________ / _ )___ __ __
_\ \/ // / __/ // / __/ -_) / _ / _ \\ \ /
/___/\_,_/\__/\_,_/_/ \__/ /____/\___/_\_\
''',"green")
banner_3 = color(r'''
_____ _ ____
/ ____| | | | _ \
| (___ _ _| |_ _ _ _ __ ___ | |_) | _____ __
\___ \| | | | __| | | | '__/ _ \ | _ < / _ \ \/ /
____) | |_| | |_| |_| | | | __/ | |_) | (_) > <
|_____/ \__,_|\__|\__,_|_| \___| |____/ \___/_/\_\
''',"red")
banner_4 = color(r'''
____ _ ____
/ ___| _ _| |_ _ _ _ __ ___ | __ ) _____ __
\___ \| | | | __| | | | '__/ _ \ | _ \ / _ \ \/ /
___) | |_| | |_| |_| | | | __/ | |_) | (_) > <
|____/ \__,_|\__|\__,_|_| \___| |____/ \___/_/\_\
''',"cyan")
def banner():
o_o = random.choice(range(4))
if o_o == 0:
return banner_1
elif o_o == 1:
return banner_2
elif o_o == 2:
return banner_3
elif o_o == 3:
return banner_4
# 工具详细列表
def Get_list():
row = prettytable.PrettyTable()
row.field_names = ['Method', "Tool", 'By', "Info"]
row.add_row(['Collect', "dismap", 'zhzyker',
'快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点'])
row.add_row(['Collect', "dirmap", 'H4ckForJob',
'一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。'])
row.add_row(['Collect', "identYwaf", 'stamparm', 'WAF识别工具'])
row.add_row(['Collect', "JSFinder", 'Threezh1',
'JSFinder是一种用于从网站上的JS文件中快速提取URL和子域的工具'])
row.add_row(['Collect', "ksubdomain", 'knownsec', '无状态子域名爆破工具'])
row.add_row(['Collect', "TideFinger", 'TideSec',
'TideFinger——指纹识别小工具,汲取整合了多个web指纹库,结合了多种指纹检测方法,让指纹检测更快捷、准确。'])
row.add_row(['Collect', "CmsVulScan", 'F6JO',
'cms识别工具,用于识别网站使用的cms,收集了github上多个扫描工具的指纹'])
row.add_row(['Vulscan', "vulmap", 'zhzyker',
'Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能'])
row.add_row(['Vulscan', "POC-bomber", 'tr0uble-mAker',
'利用大量高威胁poc/exp快速获取目标权限,用于渗透和红队快速打点'])
row.add_row(['Vulscan', "nuclei", 'projectdiscovery',
'基于简单的基于YAML的DSL的快速可定制漏洞扫描器'])
return row