unsafe 1.2.71

Creator: bradpython12

Last updated:

0 purchases

TODO
Add to Cart

Description:

unsafe 1.2.71

Unsafe (Advanced Penetration Testing Module)
An Advanced Module for Penetration Testing.
Using This Module, You Can Implement Brute Force Operations and Identification and Anonymity.
This Module is Always Being Developed and There is No Need to Worry About it Becoming Unavailable.


Author : Ahur4

𝗘 𝗫 𝗣 𝗟 𝗢 𝗜 𝗧 : Telegram Channel



Maintainer : MesutFD


Features

Encryption & Decryption
Proxy
BruteForce
Forensic
Wordpress
VulnerabilityScanner
Crawling.
Network.

Usage


Encryption & Decryption


Available Methods:
( md5 | sha1 | sha224 | sha256 | sha384 | sha512 | sha3-224 | sha3-256
sha3-384 | sha3-512 | shake128 | shake256 | base16 | base32 | base64
base85 | ascii85 | caesar )


Encryption Usage :
from unsafe import Unsafe
unsafe = Unsafe()

name = "Ahur4"

md5_name = unsafe.text_encrypt(name) # Default hash_method is "md5"
print(md5_name) # Output : 'ada3e80e34da70c99c1acff7f492993c'

base64_name = unsafe.text_encrypt(name, hash_method="base64")
print(base64_name) # Output : b'QWh1cjQ='

caesar_name = unsafe.text_encrypt(name, hash_method="caesar", count=5)
print(caesar_name) # Output : 'Fmzw4'

shake128_name = unsafe.text_encrypt(name, encode='UTF-8', hash_method="shake128", count=15)
print(shake128_name) # Output : ''c8a3ab8ca74720d227550f4f76b71f''



Decryption Usage :
from unsafe import Unsafe
unsafe = Unsafe()

hash = "ada3e80e34da70c99c1acff7f492993c" #Md5 - Value : Ahur4

name = unsafe.text_decrypt(hash=hash, word="Ahur4") #Default hash_method is "md5"
print(name) #Output : True

# When Do Not Have any Word or Wordlist Default Wordlist is John The Ripper Wordlist
name = unsafe.text_decrypt(hash=hash, hash_method="sha1")
print(name) #Output : '' ,Cause Not Found Result.








Proxy


Available Protocols :
(http | socks4 | socks5)


Proxy Wrapper Usage
from unsafe import Unsafe
unsafe = Unsafe()

proxies = unsafe.proxy_wrapper(protocol="http", max_ping=200)
print(proxies) # Output : {'ip':'port', 'ip':'port', ...}



Proxy Checker Usage
isActive = unsafe.proxy_checker(proxy_host='127.0.0.1', proxy_port='80', protocol='http', timeout=10)
print(isActive) # Output : True|False








BruteForce

AdminFinder Usage
from unsafe import Unsafe
unsafe = Unsafe()

admin_panels = unsafe.admin_finder(domain='example.com',
workers=5, # Threads
timeout=10,
ext='php', # Site type
user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)",
proxy="http://127.0.0.1:80"
)
print(admin_panels) # Output : ['http://example.com/wp-login.php']


FileManager Finder Usage
filemanagers = unsafe.filemanager_finder(domain='example.com',
workers=5, #Threads
timeout=10,
user_agent="AmigaVoyager/2.95 (compatible; MC680x0; AmigaOS; SV1)",
proxy="http://127.0.0.1:80"
)
print(filemanagers) # Output : ['https://example.com/filemanager/', 'https://example.com/filemanager/index.php']


CloudFlare Bypassing Usage
realip = unsafe.cloudflare_bypasser(domain='google.com',
workers=5, #Threads
)
print(realip) # Output : {'ns4.google.com': '216.239.38.10', 'search.google.com': '142.251.39.14', ....}


SubDomain Finder
result = unsafe.subdomain_scanner(
domain="google.com",
workers=5,
subdomains=["ww1", "forum", "download", "product", "search", "cdn", "ns1"], #Also this part have a default subdomains list.
timeout=5,
proxy="http://127.0.0.1:80"
)
print(result) # Output : ["ww1.google.com", ...]








Forensic.

Delete Image Metadata Usage
from unsafe import Unsafe
unsafe = Unsafe()

isDeleted = unsafe.delete_exif_img(path='/path/of/file.jpg')
print(isDeleted) # Output : True|False


Edit Image Metadata Usage
isEdited = unsafe.edit_exif_img(path='/path/of/file.jpg',key='model', value='unsafe')
print(isEdited) # Output : True|False


Extract Image Metadata Usage
Exifed = unsafe.extract_exif_img(path='/path/of/file.jpg')
print(Exifed) # Output : {"make": "huawei", "model": "G-750", ...}


Delete PDF Metadata Usage
result = unsafe.remove_pdf_metadata(filename="path/of/file.pdf")
print(result) # Output : 'path/of/output.pdf'


Edit PDF Metadata Usage
result = unsafe.edit_pdf_metadata(filename="path/of/file.pdf", metadata={"unsafe":"module"})
print(result) # Output : 'path/of/output.pdf'


Extract PDF Metadata Usage
result = unsafe.get_pdf_metadata(filename="path/of/file.pdf")
print(result) # Output : {"/data":"values",...}


Delete Audio Metadata Usage
result = unsafe.remove_audio_metadata(filename="path/of/file.mp3")
print(result) # Output : 'path/of/output.mp3'


Edit Audio Metadata Usage
result = unsafe.edit_audio_metadata(filename="path/of/file.mp3", metadata={"artist": "Ahur4"})
print(result) # Output : 'path/of/output.mp3'


Extract Audio Metadata Usage
result = unsafe.get_audio_metadata(filename="path/of/file.mp3")
print(result) # Output : # Output : {"/data":"values",...}








Wordpress.

Extract Admin Users
from unsafe import Unsafe
unsafe = Unsafe()

site_users = unsafe.wp_get_users(domain="wordpress.org")
print(site_users) # Output : ['admin', 'administrator']


Plugin Scanner
site_users = unsafe.wp_plugin_scanner(domain="wordpress.org",
timeout=10,
workers=5,
proxy="http://127.0.0.1:80"
)
print(site_users) # Output : ['http://wordpress.org/wp-content/plugins/wordpress-seo/',....]








VulnerabilityScanner

Xss Vulnerability Scanner
from unsafe import Unsafe
unsafe = Unsafe()

result = unsafe.xss_scanner(url="https://xsslabs.com/xss-labs-1.php", js_script="<Script>alert('hi')</scripT>")
print(result) # Output : {"is_vulnerable": is_vulnerable, "form_detail": form_details}


SqlInjection Vulnerability Scanner
result = unsafe.sql_injection_scanner(url="https://example.com/news.php?id=475433")
print(result) # Output : ["https://example.com/news.php?id=245", "......", ..]








Crawling.

Crawling a single Page and Extract Usernames, Phones, Emails and ...
from unsafe import Unsafe
unsafe = Unsafe()

result = unsafe.crawl_page(url="https://example.com/contact.php", timeout=5, proxy="http://127.0.0.1:80")
print(result) #Output : {"links": [...], "phones": [...], ...}


Search in Three Search Engines: Google, Bing and Ask
# Search a Username in Insatgram
result = unsafe.browser_search(query='"username" site:insatgram.com', timeout=10, proxy="http://127.0.0.1:80")
print(result) # Output : ['https://instagram.com/username', ....]


Scan Entered Page and Detect Xss Vulnerability.
result = unsafe.xss_scanner(url="https://xsslabs.com/xss-labs-1.php", js_script="<Script>alert('hi')</scripT>")
print(result) # Output : {'is_vulnerable': True, 'form_detail': {'action': '#', 'method': 'get', 'inputs': [{'type': 'text', 'name': 'name', 'value': "<Script>alert('hi')</scripT>"}]}}








Network

Scan Open Ports.
from unsafe import Unsafe
unsafe = Unsafe()

result = unsafe.port_scanner(host="127.0.0.1", ports=[80, 53, 443, 127])
print(result) # Output : [80, 443]


Mac Address Lookup(find owner of device company)
result = unsafe.mac_address_lookup(mac="00:00:5e:00:53:af")
print(result) #Output : "U.S. Department of Defense (IANA)"





New Features : Coming Soon...

License

For personal and professional use. You cannot resell or redistribute these repositories in their original state.

Files:

Customer Reviews

There are no reviews.