Dark Area

Explore, Secure, Evolve – IT, Cybersecurity & Ethical Hacking


Register

Sexettintool Version 15 Released with Over 100 Features!

Sexettin

New Member

Joined
May 13, 2025
Messages
1
Sexettintool – Offensive Security Toolkit

🔗 GitHub Repository: https://github.com/sexettin78/sexettintool

⚠️ Disclaimer & Legal Notice:
This tool is provided only for educational, instructional & cybersecurity-awareness purposes. All actions are your responsibility; the developer, Leafyet Studio & GitHub take no liability.

👨‍💻 About the Author:
Created by Sexettin, founder of Leafyet Studio. Built with a focus on ethical usage and hands-on learning.

💻 Installation (Linux):

Code:
sudo apt update && sudo apt upgrade
git clone https://github.com/sexettin78/sexettintool
cd sexettintool
sudo su
python3 metfora.py     # Select option [1] to install
python3 main.py

🐳 Docker (Optional):
Some functions may not work properly in containerized mode.

Code:
docker pull leafyet/sexettintool:latest
docker run -it leafyet/sexettintool:latest

🧰 Modules & Key Features:

Reconnaissance & Information Gathering:
  • Exploit Scanner: Automates exploit scanning using Searchsploit​
  • Firewall Detection Tool: Detects firewalls using wafw00f​
  • Port Scanner: Provides advanced NMAP automation for effective and specialized scans​
  • Rootkit Scanner: Initiates rootkit scanning with chkrootkit​
  • Whois Query: Displays whois lookup results for specified sites​
  • SSL Analysis: Shows SSL certificate information for specified sites​
  • DNS Information Gathering: Shows DNS information for specified domain addresses​
  • Information Gathering from IP Address: Shows information related to specified IP addresses​
  • Site IP Finder: Shows the IP address of the specified site​
  • Website Source Code Extractor: Helps you extract and save the source code of specified sites​
  • Vulnerability Scanner: Analyzes vulnerabilities using nikto​
  • Vulnerability Scanner 2: Analyzes vulnerabilities using lynis​
  • IP Address Vulnerability Analysis: Performs vulnerability analysis via API based on IP address​
  • Linux Information Collector: File you can run on target systems to gather system info, user info, network info, SSH keys, cron jobs, environment variables, process info, bash history, installed packages, and more​
  • PDF Information Gathering: Extracts metadata from PDF files and all text from pages, also allows metadata editing​
  • Email Header Analyzer: Makes exported email headers more readable and tries to reveal additional information​
  • Links Extractor: Lists all links on a specified site​
  • Text Extractor: Lists all paragraphs on a specified site​
  • Image Path Extractor: Lists all image paths on a specified site​

Web Security & Application Testing:
  • Admin Panel Finder (Static): Shows possible links that a site's admin panel might have​
  • Admin Panel Finder (Dynamic): Tries to find the admin panel of a specified site by testing the most preferred admin panel paths​
  • WordPress Scanner: Easily scan WordPress plugins, themes, admin names or perform quick scans with wpscan​
  • Database Stealing Tool: Performs database stealing operations with sqlmap automation​
  • Directory Fuzzer: Checks whether paths in the specified wordlist exist on the specified site​
  • Site Fuzzing Tool (Random): Checks how a site responds by sending different parameters​
  • Firebase Reaper: Used to extract and save data in JSON format from a specified Firebase server​
  • Subdomain Lister: Tries to find subdomains on the specified domain using a wordlist, showing found subdomain addresses with details​

Password & Authentication Tools:
  • Brute Force Tool: Offers 11 different options for ncrack brute force automation on your chosen connection type​
  • SSH Brute Force: Applies dictionary attack to specified SSH server​
  • Brute Force v2 (email): Performs brute force attacks for gmail and hotmail using Hydra​
  • Password Generator: Creates strong passwords of specified length using characters you choose​
  • Password Generator v2: Creates strong passwords of specified length​
  • Turkish ID Last 2 Digits Finder: Finds the last 2 digits using the Turkish ID algorithm and mathematical operations​
  • ZIP Password Cracker: Cracks ZIP file passwords using dictionary attacks​
  • Wordlist Generator: Creates wordlists using crunch, taking necessary information from you and providing an appropriate file​
  • Wordlist Creator: Sexettintool's own wordlist creation algorithm​
  • Handshake Decrypter: Tries to find WiFi passwords using aircrack-ng with specified wordlist and handshake files​
  • Artificial Intelligence Password Analysis: Creates a custom AI model with your specified wordlist, considers passwords you add as weak and compares your entered passwords with previous weak ones to determine password strength​
  • Encryption (md5, sha, etc.) Tool: Encrypts specified text with md5, sha1, sha224, sha256, sha384, sha512 and blake2b algorithms and shows all results​
  • Reverse Encryption (md5, sha, etc. decryption): Tries to decrypt md5, sha1, sha224, sha256, sha384, sha512 and blake2b encrypted texts using dictionary attacks​
  • Hash Analyzer: Analyzes the entered hash digest and shows which type it is​
  • File Hash Finder: Shows md5, sha1 or sha256 hash values of the specified file​
  • Advanced Encryption 1: Encrypts specified text or file with stncrypt pre 1 algorithm specially developed for sexettintool​
  • Advanced Encryption 2: Encrypts specified text or file with stncrypt pre 2 algorithm, specially developed for sexettintool​

Network & WiFi Tools:
  • Target IP VPN Checker: Checks the target IP address using ike-scan​
  • MAC Address Changer: Access 3 different MAC changing options with mac-changer​
  • WiFi Port Scanner: Performs port scanning over WiFi​
  • Abnormal DNS Detector: Lists users exceeding your specified request limit on your network​
  • DNS Router: Performs DNS routing attacks to specified IP address, also allowing network monitoring​
  • WiFi Listener 1: Lists packet routings by applying continuous listening on the network​
  • WiFi Listener 2: Performs a different type of listening than the first option​
  • Network Reaper: Network listener that listens to all or filtered packets in your network and saves them to a file​
  • Traceroute: Shows the path of a packet from source to destination​

Payload Generation & Exploitation:
  • Trojan Builder: Provides msfvenom automation with 6 different payloads​
  • Virus Creator: Helps you create viruses with 4 different virus creation options​
  • Raspberry Pi Pico Hack: Transforms your Raspberry Pi Pico device into a cybersecurity tool with 5 payloads prepared by Sexettin​
  • Sexettin Twin: Creates a clone of a network using ESP32 or ESP8266 and directs users to log in​
  • Blue-cough: Scans port addresses of Bluetooth devices and helps disrupt signals of desired Bluetooth devices​
  • Extension Spoofer: Creates possible files to help reverse shell files pass through server security​

Social Engineering & Phishing:
  • Phishing Tools: Has 3 different options, all hosted simultaneously on the server, creating a phishing laboratory using Ngrok connections​
  • Steganography: Tool for hiding data inside images without changing their appearance​
  • An0nimSMS: Sends specified messages to specified numbers (closed for Turkey)​
  • SMS Bomber: Sends consecutive messages from different SMS services to the specified number​
  • Activation Code Generators: Tries to generate activation codes for Discord, PUBG, Google Play​

OSINT & Username Tools:
  • Finding Accounts with Username (Static): Statically scans social media accounts from username​
  • Finding City from Phone Number: Shows the city associated with international numbers​
  • Search Known Username on Social Media: Dynamically checks which websites have accounts registered with the specified username​
  • Telegram User Tools: A Telegram toolkit with features to learn people's ID numbers, see estimated account creation dates from ID numbers, and more​

Automation & Bots:
  • Spambot: Writes the specified word as many times as you specify​
  • UltraBot: Can be used for view/login hacks, increasing views/downloads by repeatedly accessing specified sites​
  • Auto Clicker: Performs auto-clicking at specified time intervals​
  • Instagram Bot: Can be used to make accounts in the accounts file follow or unfollow someone collectively​
  • Crawler-x11: Automatically records your target user's messages with you and in common groups on Telegram​
  • Imitator-x11: Creates a copy of a specified person by learning their messages​

Encoding & Data Manipulation:
  • StnCrypt: Performs simple encryption for Python or HTML using substitution​
  • Encode-Decode: Performs encoding and decoding operations in URL, HTML, Base64, Base58, ASCII, HEX, OCTAL, BINARY types​
  • Base64 and Image Conversions: Used to convert Base64 format text data to image and image to Base64 format text​
  • Panelless Mail (Static): Creates random mail without management panel​
  • Link Shortening Services: Shortens desired links with is.gd or tinyurl​
  • Compiler: Compiles specified Python file to prevent others from accessing its code​
  • Python to Binary Compiler: Converts Python files to executable binaries​

System & File Tools:
  • File Comparison: Checks if specified files are completely identical​
  • File Search Operations (Linux): Lists specified keywords/sentences and related texts in files​
  • File Monitoring Monitor: Monitors file changes in specified directory​
  • LikeGrep: Data extraction program used to extract specific lines or words from a file​
  • Strings: Used to extract exportable texts from a program to see a program's server, hidden texts, and details​
  • File Analysis: Provides hash values, creation details, permissions, real extension and more information about the specified file​
  • File Time Manipulation: Changes the creation date of the specified file to your desired date​
  • Advanced Web Scraper: Used for detailed data extraction from the web with features like tag filtering, tag display, page content saving​
  • Linux Assistant: Automates basic operations on Linux, ideal for users starting to use Linux with Sexettintool​
  • Index Creator: Creates web pages according to your directives​
  • Xsnot: Allows you to take notes, delete notes, etc. on Sexettintool​
  • FotoDit: Allows you to make various photo edits via terminal with many image editing options​
  • Exif Processing Tool: You can view, edit and delete Exif data​
  • Useful Tools: Offers options for converting video to music, downloading music, downloading video, converting py files to exe format, downloading files from terminal, and playing music from terminal​

DDoS & Attack Tools:
  • DDoS Tool: Performs DDoS attacks with 12 different attack options prepared by Sexettin, with 6 sending packets of different sizes and other attacks having their own attack styles​

CVE & Vulnerability Information:
  • CVE Number Information Gathering: Collects information from CVE numbers using the Circl service API​
  • ISBN Number Information Gathering (OpenLibrary): Collects book information via OpenLibrary service using ISBN number​
  • ISBN Number Information Gathering (Google): Collects detailed information from ISBN numbers using Google's book service API​

📖 Further Learning:
Check out the author's book: "Zero to Apps with Python" – focused on Python app development & cybersecurity:

📘 g.co/kgs/Fa6b4sP
 
Top