xf - an Educational Python penetration testing framework.

xf – an Educational Python penetration testing framework.

xf is a bunch of penetration testing tools. The author not responsible for what people do with them. this is meant to be educational. this doesn’t cheat by simply running os.system() and using existing unix commands so it should in theory be cross platform
Dependencies:
+ Python 2.7.x
+ ALl Linux/Unix and Mac OSX support.

xf

Feature and Module Command Listing:
1337 – hacker typer in a real terminal (from hackertyper.py)
cipher – brute force simple ciphers and finds the answer with the most recognizable words (from cipher.py)
deathping – pings a host indefinitely with an invalid packet size that can crash the TCP/IP stack on the remote machine (from ping.py)
deathping2 – sends very large ICMP packets to an IP (different implementation) (from scapify.py)
dnstraceroute – uses a UDP DNS traceroute to find a route (from scapify.py)
gspider – crawls a website, following all links, and lists URLs (from spider.py)
hash – hash a string with several different algorithms (from hashing.py)
hashcrack – brute forces a hash using multiple threads and algorithms (from hashing.py)
hashfile – hash a file with several different algorithms (from hashing.py)
help – displays the list of commands (from _builtin)
hostname – looks up the hostname and other IP addresses of an address (from ipmac.py)
land – DoS for older windows (from scapify.py)
longping – pings a host indefinitely with a generous timeout (from ping.py)
macaddr – looks up the manufacturer associated with a MAC address (from ipmac.py)
malpacket – sends malformed ICMP packets to an IP (from scapify.py)
modules – displays the loaded modules (from _builtin)
nc – connects to a tcp socket and provides a bidirectional communication channel (from netcat.py)
ncr – connects to a tcp socket and only reads data from it (from netcat.py)
nestea – DoS for older linux and windows (from scapify.py)
packetip – sniffs packets on the specified interface and prints their ip addresses (from netsniff.py)
packets – sniffs packets on the specified interface and prints their layers (from netsniff.py)
ping – pings a host indefinitely (from ping.py)
port – looks up the services running on a port (from ipmac.py)
pscan – scans a list of ports on a host or network (from portscan.py)
qrcode – generate a qr code as an image (from qr.py)
qrdecode – decodes QR codes, barcodes, and a few others (from qrdecode.py)
report – displays the module loading reports (from _builtin)
snprefix – calculates a subnet mask from a CIDR prefix length (from ipmac.py)
spider – crawls a website, following local links only, and lists URLs (from spider.py)
sscan – scans a list of ports on a host or network and grabs the header from the service (from portscan.py)
ssh – connect to a host with ssh in an interactive shell (from ssh.py)
sshbf – brute force an SSH password with a password list (from ssh.py)
subnet – calculates a network address from a CIDR prefix length (from ipmac.py)
tcplisten – creates a tcp server that can accept connections and simply prints anything they send (from netcat.py)
tcpserve – creates a tcp server that can accept one connection and provides a bidirectional communication channel (from netcat.py)
telnet – opens a telnet connection and an interactive shell (from telnet.py)
telnetbf – brute-force a telnet password (from telnet.py)
traceroute – uses a TCP SYN traceroute to find a route (from scapify.py)
whois – looks up a website’s whois info (from whoislookup.py)
zipcrack – brute forces a password protected zip file using a wordlist (from zipcracker.py)

Usage:

Source: https://github.com/red-green