![PyPI](https://img.shields.io/pypi/v/unsafe?style=for-the-badge)
![Daily Downloads](https://img.shields.io/pypi/dd/unsafe?style=for-the-badge)
![Weekly Downloads](https://img.shields.io/pypi/dw/unsafe?style=for-the-badge)
![Monthly Downloads](https://img.shields.io/pypi/dm/unsafe?style=for-the-badge)
# Unsafe (Advanced Penetration Testing Module)
Aiming to become the best package available for hacking and security in Python.
- Author : Ahur4
- [Telegram Channel](https://t.me/Ahura_Rahmani)
- [Telegram Pv](https://t.me/Ahur4)
# Installation
```bash
pip install unsafe
```
# Features
- [x] **BruteForce**
- [x] Admin Finder
- [x] FileManager Finder
- [x] Cloudflare Bypasser
- [x] Wordpress Plugin Finder
- [x] **Cryptography**
- [x] Decrypt
- [x] Encrypt
- [x] Hash
- [x] Crack Hash
- [x] **Exploits**
- [x] [CVE-2021-42013](https://nvd.nist.gov/vuln/detail/CVE-2021-42013)
- [x] [CVE-2024-7313](https://nvd.nist.gov/vuln/detail/CVE-2024-7313)
- [x] [CVE-2024-7339](https://nvd.nist.gov/vuln/detail/CVE-2024-7339)
- [x] [CVE-2024-7928](https://nvd.nist.gov/vuln/detail/CVE-2024-7928)
- [x] Add more in the future.
- [x] Forensic
- [x] Image Metadata
- [x] PDF Metadata
- [x] Audio Metadata
- [x] Network
- [x] MacAddress Lookup
- [x] Proxy Tester
- [x] Port Scanner
- [x] Proxy Extractor
- [x] Web
- [x] Search Engine ( For GoogleDorking )
- [x] Crawler
- [x] Xss Scanner
- [x] SQL Injection Scanner
## Usage
Exploit Sample
```python
from unsafe import exploits
penetration_tester = exploits.CVE_2024_7928(
url="http://47.105.229.158:9001",
path="/index/ajax/lang",
key="lang",
value="../../application/database",
)
result = penetration_tester.check_vuln()
if result is not None:
print("Target is vulnerable !")
print("\n".join([f"{k} : {v}" for k, v in result.items()]))
else:
print("Target is not vulnerable !")
```
Mac Address lookup/Port scanner
```python
from unsafe import network
# macaddress lookup
mac_address = "00:00:5e:00:53:af"
lookup = network.mac_address_lookup(mac=mac_address)
print(lookup)
# port scanning
ports = [80, 443, 21, 27017, 9002]
ip = "127.0.0.1"
open_ports = network.port_scanner(host=ip, ports=ports)
print(open_ports)
```
### [More Examples on Github](https://github.com/ahur4/unsafe/tree/main/example)
# New Features : Coming Soon...
Raw data
{
"_id": null,
"home_page": "https://github.com/ahur4/unsafe",
"name": "unsafe",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.8",
"maintainer_email": null,
"keywords": "hack, hack-module, pentest, unsafe, osint, osint-python, hacking-python, cryptography, vulnerability-scanner, vulnerability, security, hacker, admin-finder, wordpress-scanner, instagram-osint, cve, proxy-wrapper, proxy-checker, ssh-connect, hydra, cracker, sqlmap, ahur4, mesutfd, web, acunetix",
"author": "Ahura Rahmani",
"author_email": "ahur4.rahmani@gmail.com",
"download_url": null,
"platform": null,
"description": "![PyPI](https://img.shields.io/pypi/v/unsafe?style=for-the-badge)\r\n![Daily Downloads](https://img.shields.io/pypi/dd/unsafe?style=for-the-badge)\r\n![Weekly Downloads](https://img.shields.io/pypi/dw/unsafe?style=for-the-badge)\r\n![Monthly Downloads](https://img.shields.io/pypi/dm/unsafe?style=for-the-badge)\r\n\r\n\r\n\r\n# Unsafe (Advanced Penetration Testing Module)\r\n\r\nAiming to become the best package available for hacking and security in Python.\r\n\r\n- Author : Ahur4\r\n - [Telegram Channel](https://t.me/Ahura_Rahmani)\r\n - [Telegram Pv](https://t.me/Ahur4)\r\n# Installation\r\n```bash\r\npip install unsafe\r\n```\r\n# Features\r\n\r\n- [x] **BruteForce**\r\n - [x] Admin Finder\r\n - [x] FileManager Finder\r\n - [x] Cloudflare Bypasser\r\n - [x] Wordpress Plugin Finder\r\n- [x] **Cryptography**\r\n - [x] Decrypt\r\n - [x] Encrypt\r\n - [x] Hash\r\n - [x] Crack Hash\r\n- [x] **Exploits**\r\n - [x] [CVE-2021-42013](https://nvd.nist.gov/vuln/detail/CVE-2021-42013)\r\n - [x] [CVE-2024-7313](https://nvd.nist.gov/vuln/detail/CVE-2024-7313)\r\n - [x] [CVE-2024-7339](https://nvd.nist.gov/vuln/detail/CVE-2024-7339)\r\n - [x] [CVE-2024-7928](https://nvd.nist.gov/vuln/detail/CVE-2024-7928)\r\n - [x] Add more in the future.\r\n- [x] Forensic\r\n - [x] Image Metadata\r\n - [x] PDF Metadata\r\n - [x] Audio Metadata\r\n- [x] Network\r\n - [x] MacAddress Lookup\r\n - [x] Proxy Tester\r\n - [x] Port Scanner\r\n - [x] Proxy Extractor\r\n- [x] Web\r\n - [x] Search Engine ( For GoogleDorking )\r\n - [x] Crawler\r\n - [x] Xss Scanner\r\n - [x] SQL Injection Scanner\r\n\r\n## Usage\r\nExploit Sample\r\n```python\r\nfrom unsafe import exploits\r\n\r\npenetration_tester = exploits.CVE_2024_7928(\r\n url=\"http://47.105.229.158:9001\",\r\n path=\"/index/ajax/lang\",\r\n key=\"lang\",\r\n value=\"../../application/database\",\r\n)\r\nresult = penetration_tester.check_vuln()\r\nif result is not None:\r\n print(\"Target is vulnerable !\")\r\n print(\"\\n\".join([f\"{k} : {v}\" for k, v in result.items()]))\r\nelse:\r\n print(\"Target is not vulnerable !\")\r\n```\r\n\r\nMac Address lookup/Port scanner\r\n```python\r\nfrom unsafe import network\r\n\r\n# macaddress lookup\r\nmac_address = \"00:00:5e:00:53:af\"\r\nlookup = network.mac_address_lookup(mac=mac_address)\r\nprint(lookup)\r\n\r\n# port scanning\r\nports = [80, 443, 21, 27017, 9002]\r\nip = \"127.0.0.1\"\r\nopen_ports = network.port_scanner(host=ip, ports=ports)\r\nprint(open_ports)\r\n```\r\n### [More Examples on Github](https://github.com/ahur4/unsafe/tree/main/example)\r\n# New Features : Coming Soon...\r\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "A practical and optimal library for those interested in Pentest, cryptography,Vulnerability Scanner and ..",
"version": "1.3",
"project_urls": {
"Homepage": "https://github.com/ahur4/unsafe"
},
"split_keywords": [
"hack",
" hack-module",
" pentest",
" unsafe",
" osint",
" osint-python",
" hacking-python",
" cryptography",
" vulnerability-scanner",
" vulnerability",
" security",
" hacker",
" admin-finder",
" wordpress-scanner",
" instagram-osint",
" cve",
" proxy-wrapper",
" proxy-checker",
" ssh-connect",
" hydra",
" cracker",
" sqlmap",
" ahur4",
" mesutfd",
" web",
" acunetix"
],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "7209d3e2b40bcfd9e09a78c63b6f561898dee488b641823d0f4ce6540156c419",
"md5": "93e1a754b6b7b4ddb3cdc715cee7894d",
"sha256": "fced02d2fc4e323f194a59a5722007beba3d86a3fab2390e0fde0c1d73237885"
},
"downloads": -1,
"filename": "unsafe-1.3-py3-none-any.whl",
"has_sig": false,
"md5_digest": "93e1a754b6b7b4ddb3cdc715cee7894d",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.8",
"size": 361108,
"upload_time": "2024-10-09T04:54:48",
"upload_time_iso_8601": "2024-10-09T04:54:48.345510Z",
"url": "https://files.pythonhosted.org/packages/72/09/d3e2b40bcfd9e09a78c63b6f561898dee488b641823d0f4ce6540156c419/unsafe-1.3-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-10-09 04:54:48",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "ahur4",
"github_project": "unsafe",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [
{
"name": "beautifulsoup4",
"specs": [
[
"==",
"4.12.3"
]
]
},
{
"name": "certifi",
"specs": [
[
"==",
"2024.8.30"
]
]
},
{
"name": "charset-normalizer",
"specs": [
[
"==",
"3.3.2"
]
]
},
{
"name": "idna",
"specs": [
[
"==",
"3.10"
]
]
},
{
"name": "mutagen",
"specs": [
[
"==",
"1.47.0"
]
]
},
{
"name": "pillow",
"specs": [
[
"==",
"10.4.0"
]
]
},
{
"name": "plum-py",
"specs": [
[
"==",
"0.8.7"
]
]
},
{
"name": "PyPDF2",
"specs": [
[
"==",
"3.0.1"
]
]
},
{
"name": "PySocks",
"specs": [
[
"==",
"1.7.1"
]
]
},
{
"name": "requests",
"specs": [
[
"==",
"2.32.3"
]
]
},
{
"name": "soupsieve",
"specs": [
[
"==",
"2.6"
]
]
},
{
"name": "urllib3",
"specs": [
[
"==",
"2.2.3"
]
]
}
],
"lcname": "unsafe"
}