Sexettintool – Offensive Security Toolkit
GitHub Repository: https://github.com/sexettin78/sexettintool


This tool is provided only for educational, instructional & cybersecurity-awareness purposes. All actions are your responsibility; the developer, Leafyet Studio & GitHub take no liability.

Created by Sexettin, founder of Leafyet Studio. Built with a focus on ethical usage and hands-on learning.

Code:
sudo apt update && sudo apt upgrade
git clone https://github.com/sexettin78/sexettintool
cd sexettintool
sudo su
python3 metfora.py # Select option [1] to install
python3 main.py

Some functions may not work properly in containerized mode.
Code:
docker pull leafyet/sexettintool:latest
docker run -it leafyet/sexettintool:latest

Reconnaissance & Information Gathering:
- Exploit Scanner: Automates exploit scanning using Searchsploit
- Firewall Detection Tool: Detects firewalls using wafw00f
- Port Scanner: Provides advanced NMAP automation for effective and specialized scans
- Rootkit Scanner: Initiates rootkit scanning with chkrootkit
- Whois Query: Displays whois lookup results for specified sites
- SSL Analysis: Shows SSL certificate information for specified sites
- DNS Information Gathering: Shows DNS information for specified domain addresses
- Information Gathering from IP Address: Shows information related to specified IP addresses
- Site IP Finder: Shows the IP address of the specified site
- Website Source Code Extractor: Helps you extract and save the source code of specified sites
- Vulnerability Scanner: Analyzes vulnerabilities using nikto
- Vulnerability Scanner 2: Analyzes vulnerabilities using lynis
- IP Address Vulnerability Analysis: Performs vulnerability analysis via API based on IP address
- Linux Information Collector: File you can run on target systems to gather system info, user info, network info, SSH keys, cron jobs, environment variables, process info, bash history, installed packages, and more
- PDF Information Gathering: Extracts metadata from PDF files and all text from pages, also allows metadata editing
- Email Header Analyzer: Makes exported email headers more readable and tries to reveal additional information
- Links Extractor: Lists all links on a specified site
- Text Extractor: Lists all paragraphs on a specified site
- Image Path Extractor: Lists all image paths on a specified site
Web Security & Application Testing:
- Admin Panel Finder (Static): Shows possible links that a site's admin panel might have
- Admin Panel Finder (Dynamic): Tries to find the admin panel of a specified site by testing the most preferred admin panel paths
- WordPress Scanner: Easily scan WordPress plugins, themes, admin names or perform quick scans with wpscan
- Database Stealing Tool: Performs database stealing operations with sqlmap automation
- Directory Fuzzer: Checks whether paths in the specified wordlist exist on the specified site
- Site Fuzzing Tool (Random): Checks how a site responds by sending different parameters
- Firebase Reaper: Used to extract and save data in JSON format from a specified Firebase server
- Subdomain Lister: Tries to find subdomains on the specified domain using a wordlist, showing found subdomain addresses with details
Password & Authentication Tools:
- Brute Force Tool: Offers 11 different options for ncrack brute force automation on your chosen connection type
- SSH Brute Force: Applies dictionary attack to specified SSH server
- Brute Force v2 (email): Performs brute force attacks for gmail and hotmail using Hydra
- Password Generator: Creates strong passwords of specified length using characters you choose
- Password Generator v2: Creates strong passwords of specified length
- Turkish ID Last 2 Digits Finder: Finds the last 2 digits using the Turkish ID algorithm and mathematical operations
- ZIP Password Cracker: Cracks ZIP file passwords using dictionary attacks
- Wordlist Generator: Creates wordlists using crunch, taking necessary information from you and providing an appropriate file
- Wordlist Creator: Sexettintool's own wordlist creation algorithm
- Handshake Decrypter: Tries to find WiFi passwords using aircrack-ng with specified wordlist and handshake files
- Artificial Intelligence Password Analysis: Creates a custom AI model with your specified wordlist, considers passwords you add as weak and compares your entered passwords with previous weak ones to determine password strength
- Encryption (md5, sha, etc.) Tool: Encrypts specified text with md5, sha1, sha224, sha256, sha384, sha512 and blake2b algorithms and shows all results
- Reverse Encryption (md5, sha, etc. decryption): Tries to decrypt md5, sha1, sha224, sha256, sha384, sha512 and blake2b encrypted texts using dictionary attacks
- Hash Analyzer: Analyzes the entered hash digest and shows which type it is
- File Hash Finder: Shows md5, sha1 or sha256 hash values of the specified file
- Advanced Encryption 1: Encrypts specified text or file with stncrypt pre 1 algorithm specially developed for sexettintool
- Advanced Encryption 2: Encrypts specified text or file with stncrypt pre 2 algorithm, specially developed for sexettintool
Network & WiFi Tools:
- Target IP VPN Checker: Checks the target IP address using ike-scan
- MAC Address Changer: Access 3 different MAC changing options with mac-changer
- WiFi Port Scanner: Performs port scanning over WiFi
- Abnormal DNS Detector: Lists users exceeding your specified request limit on your network
- DNS Router: Performs DNS routing attacks to specified IP address, also allowing network monitoring
- WiFi Listener 1: Lists packet routings by applying continuous listening on the network
- WiFi Listener 2: Performs a different type of listening than the first option
- Network Reaper: Network listener that listens to all or filtered packets in your network and saves them to a file
- Traceroute: Shows the path of a packet from source to destination
Payload Generation & Exploitation:
- Trojan Builder: Provides msfvenom automation with 6 different payloads
- Virus Creator: Helps you create viruses with 4 different virus creation options
- Raspberry Pi Pico Hack: Transforms your Raspberry Pi Pico device into a cybersecurity tool with 5 payloads prepared by Sexettin
- Sexettin Twin: Creates a clone of a network using ESP32 or ESP8266 and directs users to log in
- Blue-cough: Scans port addresses of Bluetooth devices and helps disrupt signals of desired Bluetooth devices
- Extension Spoofer: Creates possible files to help reverse shell files pass through server security
Social Engineering & Phishing:
- Phishing Tools: Has 3 different options, all hosted simultaneously on the server, creating a phishing laboratory using Ngrok connections
- Steganography: Tool for hiding data inside images without changing their appearance
- An0nimSMS: Sends specified messages to specified numbers (closed for Turkey)
- SMS Bomber: Sends consecutive messages from different SMS services to the specified number
- Activation Code Generators: Tries to generate activation codes for Discord, PUBG, Google Play
OSINT & Username Tools:
- Finding Accounts with Username (Static): Statically scans social media accounts from username
- Finding City from Phone Number: Shows the city associated with international numbers
- Search Known Username on Social Media: Dynamically checks which websites have accounts registered with the specified username
- Telegram User Tools: A Telegram toolkit with features to learn people's ID numbers, see estimated account creation dates from ID numbers, and more
Automation & Bots:
- Spambot: Writes the specified word as many times as you specify
- UltraBot: Can be used for view/login hacks, increasing views/downloads by repeatedly accessing specified sites
- Auto Clicker: Performs auto-clicking at specified time intervals
- Instagram Bot: Can be used to make accounts in the accounts file follow or unfollow someone collectively
- Crawler-x11: Automatically records your target user's messages with you and in common groups on Telegram
- Imitator-x11: Creates a copy of a specified person by learning their messages
Encoding & Data Manipulation:
- StnCrypt: Performs simple encryption for Python or HTML using substitution
- Encode-Decode: Performs encoding and decoding operations in URL, HTML, Base64, Base58, ASCII, HEX, OCTAL, BINARY types
- Base64 and Image Conversions: Used to convert Base64 format text data to image and image to Base64 format text
- Panelless Mail (Static): Creates random mail without management panel
- Link Shortening Services: Shortens desired links with is.gd or tinyurl
- Compiler: Compiles specified Python file to prevent others from accessing its code
- Python to Binary Compiler: Converts Python files to executable binaries
System & File Tools:
- File Comparison: Checks if specified files are completely identical
- File Search Operations (Linux): Lists specified keywords/sentences and related texts in files
- File Monitoring Monitor: Monitors file changes in specified directory
- LikeGrep: Data extraction program used to extract specific lines or words from a file
- Strings: Used to extract exportable texts from a program to see a program's server, hidden texts, and details
- File Analysis: Provides hash values, creation details, permissions, real extension and more information about the specified file
- File Time Manipulation: Changes the creation date of the specified file to your desired date
- Advanced Web Scraper: Used for detailed data extraction from the web with features like tag filtering, tag display, page content saving
- Linux Assistant: Automates basic operations on Linux, ideal for users starting to use Linux with Sexettintool
- Index Creator: Creates web pages according to your directives
- Xsnot: Allows you to take notes, delete notes, etc. on Sexettintool
- FotoDit: Allows you to make various photo edits via terminal with many image editing options
- Exif Processing Tool: You can view, edit and delete Exif data
- Useful Tools: Offers options for converting video to music, downloading music, downloading video, converting py files to exe format, downloading files from terminal, and playing music from terminal
DDoS & Attack Tools:
- DDoS Tool: Performs DDoS attacks with 12 different attack options prepared by Sexettin, with 6 sending packets of different sizes and other attacks having their own attack styles
CVE & Vulnerability Information:
- CVE Number Information Gathering: Collects information from CVE numbers using the Circl service API
- ISBN Number Information Gathering (OpenLibrary): Collects book information via OpenLibrary service using ISBN number
- ISBN Number Information Gathering (Google): Collects detailed information from ISBN numbers using Google's book service API

Check out the author's book: "Zero to Apps with Python" – focused on Python app development & cybersecurity:
