#!/usr/bin/python import os # Global Elite(variables) addOaValid = "0" oaAdder = "" # Functions def fpingTxt(): fpingTarget = input("Set fping range for scan: (192.168.1.0-254)") os.system("cd && rm ~/fping.txt") # Combine multiple commands into one line os.system(f"fping -a -g {fpingTarget} >> fping.txt") print("fping should be finished now!") def menu(): print(""" ############################# # # # CHOOSE ARGUMENTS # # FOR NMAP # # # ############################# This is a list of precompiled slightly modular cmds By default all NMAP cmds are set to -T4 -T4 sends packets at an aggressive rate or 1.25p/s ############################# 0. HOST DISCOVERER - USES NMAP TO CHECK IF TARGET(s) ARE ALIVE 1. FULL SCAN - ALL PORTS (0-65,535) 2. TCP CONNECT, OS, DETAILED SERVICE SCAN FOR OPEN PORTS 3. VIOLATE TCP CONNECTION WITH XMAS 4. MASSCAN PORT 80 OF TARGET(s) Anything else to exit. ############################# """) def menuSelector(): menuChoice = input("Choose from above") if menuChoice == "0": print("0.Selected Host Discoverer...") elif menuChoice == "1": print("1.Selected Full Scan...") elif menuChoice == "2": print("2.Selected TCP Connect...") elif menuChoice == "3": print("3.Selected TCP Violation...") elif menuChoice == "4": print("4.Selected Masscan...") else: print("Exiting...") return menuChoice def cmdList(): menuChoice = menuSelector() os.system("cd") if menuChoice == "0": os.system("nmap -T4 -sn -iL ~/fping.txt %s" % oaAdder) elif menuChoice == "1": os.system("nmap -T4 -p- -iL ~/fping.txt %s" % oaAdder) elif menuChoice == "2": os.system("nmap -T4 -O -sT -sV -iL ~/fping.txt %s" % oaAdder) elif menuChoice == "3": os.system("nmap -T4 -sX -iL ~/fping.txt %s" % oaAdder) elif menuChoice == "4": os.system("masscan -p80 -iL ~/fping.txt %s" % oaAdder)