MBHudson / Vigilante-Toolset

!!!WORLD'S 🌍 #1πŸ₯‡ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most tools to work as normal while resolving .onion

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


Vigilante-Toolset

11/9/2020 Update: Installer fixed, missing files uploaded. Will now run with the newest versions of Kali and Parrot OS. If you have already installed Vigilante-Toolset please reinstall the program.



DEMO/TUTORIAL

Tor hacking toolkit designed specifically to combat illegal child exploitation websites. !!!Vigilante-Toolset is for EDUCATIONAL PURPOSES ONLY and should NEVER BE USED ILLEGALLY!!!
Proof of Concept/Tutorial Videos Β»

Manual Β· Report Bug Β· Request Feature

Table of Contents

About The Project

~#: Vigilante-Toolset is a project with the goal in stopping the spread of child exploitation through Tor by finding, disabling and reporting child exploitation websites. The Concept works by proxying Tor through a localhost and then using an arsenal of the very same tools you've come to love, along with some super effective modded and original tools, against Tor websites. Every tool is automated and geared towards ease of use along with the project's specific purpose in mind. All attacks can be deployed in 7 key strokes or less. Automation designed so that anyone novice to pro can volunteer and make a difference. Don't let this tool set's easy of use fool you though, as you'll see from our YouTube channel, Vigilante-Toolset takes out Tor sites in real world situations with ease.

Tools Include more coming soon

  • Automated Proxy/Socket/Tor Handling
  • Nmap
  • SQLmap
  • Nikito
  • Full Port Scan added 1/08/2020
  • Custom Port Scan added 1/08/2020
  • Custom Proxy added 1/08/2020
  • Uniscan
  • Automated Brute Force w/word lists
  • XerXes DDoS
  • DDoSx4
  • IPgeolocate
  • Anonymous File Share
  • Anonymous E-Mail

MORE TO COME:

  • XSSer
  • XSStrike
  • Payload Generator/Handler
  • Crawler
  • ClickJacking
  • Metasploit
  • BeEF
  • Site Cloner
  • Phishing/Social Engineering Bundles
  • Apache2/Struts Exploitation Automation
  • Bot Net Manager w/ready made UFONet bot networks
  • and more...

Built With

Getting Started

!!!MAKE SURE TO INSTALL VIGILANTE-TOOLKIT FOLDER IN YOUR ROOT DIRECTORY!!!

Prerequisites

  • Terminator
  • Etherape
  • Tor
  • Tor Browser
  • SoCat
  • python3-pip
  • Proxychains4
  • Docker
  • python3

These should be the only things the installer downloads as Kali should have the rest.

Installation


If you are installing from .Zip file rename "Vigilante-Toolset-Master" to just "Vigilante-Toolset" and skip to step two

  1. Clone the repo
sudo git clone https://github.com/MBHudson/Vigilante-Toolset.git
  1. Change Directory
cd Vigilante-Toolset
  1. Give Permissions
sudo chmod +x ./install.sh
  1. Run Installer
sudo ./install.sh
  1. Run Vigilante-Toolset
sudo ./Vigilante

Usage

Run the Script

Make sure you are in the Vigilant-Toolkit directory or

cd Vigilante-Toolset

Run Vigilante-Toolset

sudo ./Vigilante

Main Menu

DEMO/TUTORIAL

For each menu a corresponding number, from left to right, 1, 2, 3. You confirm your selection by the ENTER key. Typing, without quotes, "help" will always bring you back to the usage page. Type the letter "q" to quit from main menu.

Menu "1"

DEMO/TUTORIAL

Option "1" should be your first step, this connects to TOR and sets up the proxy. A seperate terminal will open and prompt you to enter a URL. COPY and PASTE your TARGET URL. without the HTTP:// or / at the end, into the terminal and press ENTER.

Press the letter "t" in any menu to access your TARGET notes. To save notes press CTRL+X (at the same time) followed by the letter "Y" and then ENTER. Press the letter "b" in any menu to go back to the main menu.

Menu "2"

DEMO/TUTORIAL

Here we have many different tools most I'm sure you are familur with, everything is clearly labeled. For stragity and how to use these tool specificaly see Manifesto

Menu "3"

DEMO/TUTORIAL

The hope is to gather info leading to the identity of the server's owner; reporting all evidence collected to the proper authorities in that person's jurisdiction thorugh anonymous file sharing/e-mail.

More to come later, sorry

See the Tutorial Video for features (and how to use them) More to come soon.

Manifesto

I have found that most of these types of sites are usually ran from an older Windows machine, sometimes a Raspberry Pi3 and not often updated. Minimal in power they are usually very easy to take down with DdoS attacks. I'm working on the port scanner (update: I have added a port scanner now, customize what ports or do them all + decide what port to proxy 8000) and crawler but for now everything is based off of what would normaly be port 80. Menu 2 Option 4 finds admin logins and other pages that sometimes lead to the identity of who owns the server. Brute forcing is always an option, Option 5 I believe, but I would suggest supplemental word lists. Sometimes you can get lucky when searching through pages found from the directory scan and happen upon a SQL server. In such a case there are instructions within all terminal prompts guiding you as to what information is needed.

See the Tutorial Video for features (and how to use them) More to come soon.

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

To be honest I have no idea how this whole licensing part works. If there is any issue please E-mail me and I'm sure we can figure something out. Thank you

Contact

Acknowledgments

  • CyberXCodder
  • @xer0dayz
  • Miroslav Stampar
  • and many more to be added later. Until then creatits may be found spread out within the source code.

About

!!!WORLD'S 🌍 #1πŸ₯‡ TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most tools to work as normal while resolving .onion


Languages

Language:Shell 80.7%Language:C 16.6%Language:Dockerfile 2.7%