From fe7fedffdebf0b6988d1fb493fc640136b6d686b Mon Sep 17 00:00:00 2001 From: root Date: Wed, 16 Aug 2017 19:02:40 +0000 Subject: [PATCH 1/2] Fixed script to add UTF-8 encoding --- xerosploit.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xerosploit.py b/xerosploit.py index b286a00..2a33e81 100755 --- a/xerosploit.py +++ b/xerosploit.py @@ -86,7 +86,7 @@ def home(): table = [["IP Address","MAC Address","Gateway","Iface","Hostname"], ["","","","",""], [n_ip,n_mac.upper(),gateway,up_interface,n_host]] - print (tabulate(table, stralign="center",tablefmt="fancy_grid",headers="firstrow")) + print (tabulate(table, stralign="center",tablefmt="fancy_grid",headers="firstrow")).encode('utf-8') print ("") @@ -96,7 +96,7 @@ def home(): ['\033[1;36m\nInformation\n', 'XeroSploit is a penetration testing toolkit whose goal is to \nperform man in the middle attacks for testing purposes. \nIt brings various modules that allow to realise efficient attacks.\nThis tool is Powered by Bettercap and Nmap.\033[1;m'] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') # Get a list of all currently connected devices , using Nmap. From 4ece645f9b20d4df2af02b3fa1f4d2445a62209c Mon Sep 17 00:00:00 2001 From: Jeff Date: Wed, 16 Aug 2017 19:18:46 +0000 Subject: [PATCH 2/2] Forgot to fix a few of the encodes. Fixed that. --- xerosploit.py | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/xerosploit.py b/xerosploit.py index 2a33e81..74c6d7f 100755 --- a/xerosploit.py +++ b/xerosploit.py @@ -125,7 +125,7 @@ def scan(): # Show devices found on your network print("\033[1;36m[+]═══════════[ Devices found on your network ]═══════════[+]\n\033[1;m") - print(table.table) + print(table.table).encode('utf-8') target_ip() @@ -212,7 +212,7 @@ def pscan(): ] table = DoubleTable(table_data) print("\033[1;36m\n[+]═════════[ Port scan result for " + target_ips +" ]═════════[+]\n\033[1;m") - print(table.table) + print(table.table).encode('utf-8') pscan() else: @@ -310,7 +310,7 @@ def ping(): ] table = DoubleTable(table_data) print("\033[1;36m\n[+]═════════[ " + target_ips +" ping statistics ]═════════[+]\n\033[1;m") - print(table.table) + print(table.table).encode('utf-8') ping() else: print("\033[1;91m\n[!] Error : Command not found.\033[1;m") @@ -821,7 +821,7 @@ def deface(): deface : Overwrite all web pages with your HTML code\n\033[1;m"""] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') option() else: print("\033[1;91m\n[!] Error : Module not found . Type 'help' to view the modules list. \033[1;m") @@ -841,7 +841,7 @@ def deface(): ["\033[1;36m\nInformation\n", "\nInsert your target IP address.\nMultiple targets : ip1,ip2,ip3,... \nThe 'all' command will target all your network.\n\n\033[1;m"] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') target_ip() # if target = all the network elif target_ips == "all": @@ -876,7 +876,7 @@ def gateway(): ["\033[1;36m\nInformation\n", "\nManually set your gateway.\nInsert '0' if you want to choose your default network gateway.\n\033[1;m"] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') print("\033[1;32m\n[+] Enter your network gateway.\n\033[1;m") n_gateway = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4mgateway\033[0m\033[1;36m ➮ \033[1;m").strip() @@ -903,7 +903,7 @@ def iface(): ["\033[1;36m\nInformation\n", "\nManually set your network interface.\nInsert '0' if you want to choose your default network interface.\n\033[1;m"] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') print("\033[1;32m\n[+] Enter your network interface.\n\033[1;m") n_up_interface = raw_input("\033[1;36m\033[4mXero\033[0m»\033[1;36m\033[4miface\033[0m\033[1;36m ➮ \033[1;m").strip() @@ -970,7 +970,7 @@ def rm_log(): exit : Close Xerosploit.\n\033[1;m"""] ] table = DoubleTable(table_datas) - print(table.table) + print(table.table).encode('utf-8') else: